0% found this document useful (0 votes)
1K views

Computer Network Quiz - 2 With Answers

The document contains 51 multiple choice questions about networking concepts such as protocols, ports, network models, devices and topologies. It tests knowledge of common acronyms and standards like POP, OSI, HTTP, TCP/IP and their properties. The questions cover a wide range of topics including network layers, transmission methods, network devices, error detection techniques and cryptography basics.
Copyright
© © All Rights Reserved
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views

Computer Network Quiz - 2 With Answers

The document contains 51 multiple choice questions about networking concepts such as protocols, ports, network models, devices and topologies. It tests knowledge of common acronyms and standards like POP, OSI, HTTP, TCP/IP and their properties. The questions cover a wide range of topics including network layers, transmission methods, network devices, error detection techniques and cryptography basics.
Copyright
© © All Rights Reserved
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 15

1. What does PoP stand for?

A. Pre Office Protocol


B. Post Office Protocol
C. Protocol of Post
D. None

Ans: Post Office Protocol

2. What is the port number of PoP?


A. 35
B. 43
C. 110
D. 25

Ans: 110

3. What is the number of layers in the OSI model?


A. 2 Layers
B. 4 Layers
C. 7 Layers
D. 9 Layers

Ans: 7 Layers

4. The full form of OSI is?


A. Operating System Interface
B. Optical System Interconnection
C. Operating System Internet
D. Open System Interconnection

Ans: Open System Interconnection

5. Identify the layer which provides service to the user.


A. Session Layer
B. Application Layer
C. Presentation Error
D. Physical Layer

Ans: Application Layer

6. What is a HUB?
A. Software
B. Computing Device
C. Network Device
D. Calculation Device

Ans: Network Device

7. What does a set of rules define?


A. SMTP
B. FTP
C. IMAP
D. Protocol

Ans: Protocol

8. Identify among the following which is mainly used to host


A. Mail Server
B. Webserver
C. Database Server
D. None

Ans: Webserver

9. Identify the full form of HTTP?


A. HyperText Transfer Protocol
B. HyperText Transfer Package
C. Hyper Transfer Text Package
D. Hyper Transfer Text Practice

Ans: HyperText Transfer Protocol

10. Identify the protocol primarily used for browsing data.


A. FTP
B. TCP
C. TFTP
D. HTTP

Ans: HTTP

11. Identify the total versions of IP.


A. 1
B. 2
C. 3
D. 4

Ans: 2

12. Identify the first network which was based on TCP/IP protocol.
A. ARPANET
B. HUB
C. Ethernet Card
D. Router

Ans: ARPANET

13. Choose among the following, which is the most common internet Protocol.
A. PPP
B. FTP
C. TCP/IP
D. SMTP

Ans: SMTP

14. What does TCP/IP stand for?


A. Telephone control protocol/Internet protocol.
B. Transmission control protocol/Internet protocol.
C. Transmission control protocol/International protocol.
D. None

Ans: Transmission control protocol/Internet protocol.

15. Which of the following layer isn’t present in the TCP/IP model but is included
in the OSI model?
A. Network Layer
B. session layer
C. Application Layer
D. Transport Layer
Ans: session layer

16. What is the collection of the hyperlinked document on the internet known as?
A. HTML
B. EMAIL
C. WWW
D. Internet

Ans: WWW

17. What is the location of a resource on the internet given by?


A. Email
B. IP
C. Protocol
D. URL

Ans: URL

18. Identify the incorrect network topology,


A. Bus
B. Star
C. P2P
D. Ring

Ans: P2P

19. Which of these is a standard interface for serial data transmission.


A. ASCII
B. RS232C
C. 2
D. Centronics

Ans: RS232C

20. Which type of topology is best suited for large businesses which must carefully
control and coordinate the operation of distributed branch outlets?
A. Ring
B. Local area
C. Hierarchical
D. Star

Ans: Star

21. Which of the following transmission directions listed is not a legitimate


channel?
A. Simplex
B. Half Duplex
C. Full Duplex
D. Double Duplex

Ans: Double Duplex

22. "Parity bits" are used for which of the following purposes?
A. Encryption of data
B. To transmit faster
C. To detect errors
D. To identify the user
Ans: To detect errors

23. What kind of transmission medium is most appropriate to carry data in a


computer network that is exposed to electrical interferences?
A. Unshielded twisted pair
B. Optical fiber
C. Coaxial cable
D. Microwave

Ans: Optical fiber

24. Which one of the following is a valid email address?


A. gmail.com
B. [email protected]
C. [email protected]
D. computernetworks@cn

Ans: [email protected]

25. Which of the following best describes uploading information?


A. Sorting data on a disk drive
B. Sending information to a host computer
C. Receiving information from a host computer
D. Sorting data on a hard drive

Ans: Sending information to a host computer

26. At what speed does tele-computed refer?


A. Interface speed
B. Cycles per second
C. Baud rate
D. Megabyte load

Ans: Baud rate

27. Consider the following:


1. Twisted pair cables
2. Microwaves and Satellite Signals
3. Repeaters
4. Analog Transmissions
5. Fiber optics
Which of the above is consider as (a) signal transmission medium is data
communications?
A. (1) and (5)
B. (1) and (2)
C. (1) (2) and (5)
D. (1) (2) (3) and (5)

Ans: (1) (2) and (5)

28. The term WAN stands for?


A. Wide Area Net
B. Wide Access Network
C. Wide Area Network
D. Wide Access Net

Ans: Wide Area Network

29. Which of the following cannot be used as a medium for 802.3 ethernet?
A. A thin coaxial cable
B. A twisted pair cable
C. A microwave link
D. A fiber optical cable

Ans: A microwave link

30) What IP address class allocates 8 bits for the host identification part?
A. Class A
B. Class B
C. Class C
D. Class D

Ans: Class C

31. Which layer of the TCP / IP stack corresponds to the OSI model transport layer?
A. Host to host
B. Application
C. Internet
D. Network Access

Ans: Host to Host

32. On a simplex data link, which of the following is a possible error recovery
technique?
A. Backward error correction (BEC)
B. The use of hamming codes
C. Automatic Repeat Request (ARQ)
D. Downward error correction (DEC)

Ans: The use of hamming codes

33. Which of the statement is correct with regard to Time Division Multiplexing
(TDM) and its variants?
A. Statistical TDM makes efficient use of the bandwidth only if the arrival
pattern of the data stream is probabilistic.
B. TDM requires the transmitter and receiver to be synchronized periodically.
C. TDM performs efficiently if the arrival pattern of the data stream is
probabilistic.
D. Statistical TDM is efficient if the data stream is deterministic.

Ans: (a) and (b)

34. The term LAN stands for?


A. Local Area Net
B. Local Area Network
C. Local Array Network
D. Local Array Net

Ans: Local Area Network

35. Which of the through is share the data of two computer?


A. Library
B. Network
C. Grouping
D. Integrated system

Ans: Network
36. In specific, if the systems use separate protocols, which one of the following
devices is used to link two systems?
A. Repeater
B. Gateway
C. Bridge
D. Hub

Ans: Gateway

37. The private key in asymmetric key cryptography is kept by?


A. Sender
B. Receiver
C. Sender and Receiver
D. None of the these

Ans: Receiver

38. The correct order of corresponding OSI layers for having functionalities of
routing and reconciling machine representation differences with shared access
resolution and ASCII test protocol is?
A. Network, Physical, Transport, Data link
B. Network, Physical, Data link, Application
C. Network, Presentation, Data link, Application
D. Network, Presentation, Physical, Transport

Ans: Network, Presentation, Data link, Application

39. In which of the following switching methods, the message is divided into small
packets?
A. Message switching
B. Packet switching
C. Virtual switching
D. None of the these

Ans: Packet switching

40. Which of the following switch methods creates a point-to-point physical


connection between two or more computers?
A. Message switching
B. Packet switching
C. Circuit switching
D. None of the these

Ans: Circuit switching

41. What is the maximum data transfer rate of the optical fiber wire?
A. 50 kbps
B. 1000 kbps
C. 1000 Mbps
D. None of the these

Ans: 1000 Mbps

42. SLIP stands for _______


A. System line internet protocol
B. Serial line internet protocol
C. Signal line internet protocol
D. Signal internet protocol
Ans: Serial line internet protocol

43. The second port is used to ____________ in the two-port network.


A. Input terminal
B. Output terminal
C. Signal terminal
D. Bandwidth terminal

Ans: Output terminal

44. SONET stands for ______________.


A. Signal Operation Network
B. Synchronous Optical Network
C. System Optical Network
D. Signal Optical Network

Ans: Synchronous Optical Network

45. What is the size of the destination port in the UDP protocol?
A. 8 bits
B. 20 bits
C. 16 bits
D. 32 bits

Ans: 16 bits

46. MAC address is also called ______.


A. Physical address
B. Logical address
C. Source address
D. Destination address

Ans: Physical address

47. Which of the following addresses is 32-bit?


A. MAC address
B. Virtual address
C. Source address
D. Destination address

Ans: Virtual address

48. ARPANET stands for _______.


A. Advanced Recheck Projects Agency Internet
B. Advanced Recheck Projects Agency Network
C. Advanced Research Projects Agency Network
D. Advanced Research Projects Agency Internet

Ans: Advanced Research Projects Agency Network

49. What is the size of the UDP header?


A. 8 bytes
B. 20 bytes
C. 64 bytes
D. 16 bytes

Ans: 8 bytes

50. Which of the following protocols is the connection-less protocol?


A. UDP
B. TCP
C. IP
D. All of the these

Ans: UDP

51. Generally_____________is a multiport repeater


A. repeater
B. hub
C. switch
D. router

Ans:hub

52. A switch enables_____________for devices like hubs and routers


A. Paths
B. routes
C. cables
D. connections

Ans: Connections

53. A LAN segment is the group of devices connected to a hub for the purpose of
sharing____________
A. paths
B. resources
C. devices
D. hubs

Ans: resources

54. a___________can be used to enhance network performance


A. bridge
B. switch
C. hub
D. router

Ans: bridge

55. What is the maximum data transfer rate of the optical fiber wire?
A. 50 kbps
B. 1000 kbps
C. 1000 Mbps
D. None of the these

Ans: 1000 Mbps

56. In the layer hierarchy as the data packet moves from the upper to the lower
layers, headers are ___________
A. Added
B. Removed
C. Rearranged
D. Modified

Ans: Added

57. Application layer is implemented in ____________


A. End system
B. NIC
C. Ethernet
D. Packet transport

Ans: End system

58. Transport layer is implemented in ______________


A. End system
B. NIC
C. Ethernet
D. Signal transmission

Ans: End system

59. The functionalities of the presentation layer include ____________


A.Data compression
B. Data encryption
C. Data description
D. All of the mentioned

Ans: All of the mentioned

60. Delimiting and synchronization of data exchange is provided by __________


A. Application layer
B. Session layer
C. Transport layer
D. Link layer

Ans: Session layer

61. In OSI model, when data is sent from device A to device B, the 5th layer to
receive data at B is _________
A. Application layer
B. Transport layer
C. Link layer
D. Session layer

Ans: Session layer

62. In TCP IP Model, when data is sent from device A to device B, the 4th layer to
receive data at B is ____________
A. Application layer
B. Transport layer
C. Link layer
D. Session layer

Ans: Application layer

63. The physical layer is concerned with ___________


A. bit-by-bit delivery
B. application to application delivery
C. process to process delivery
D. port to port delivery

Ans: bit-by-bit delivery

64. Which transmission media provides the highest transmission speed in a network?
A. optical fiber
B. electrical cable
C. twisted pair cable
D. coaxial cable

Ans: optical fiber

65. Bits can be sent over guided and unguided media as analog signal by ___________
A. digital modulation
B. frequency modulation
C. amplitude modulation
D. phase modulation

Ans: digital modulation

66. In asynchronous serial communication the physical layer provides ___________


A. start and stop signalling
B. flow control
C. both start & stop signalling and flow control
D. only start signalling

Ans: both start & stop signalling and flow control

67. The physical layer is responsible for __________


A. line coding
B. channel coding
C. modulation
D. all of the mentioned

Ans: all of the mentioned

68. The physical layer translates logical communication requests from the ______
into hardware specific operations.
A. data link layer
B. trasnport layer
C. network layer
D. application layer

Ans: data link layer

69. Wireless transmission of signals can be done via ___________


A. radio waves
B. microwaves
C. infrared
D. all of the mentioned
70. The data link layer takes the packets from _________ and encapsulates them
into frames for transmission.
A. network layer
B. physical layer
C. transport layer
D. application layer

Ans:network layer

71. Which of the following tasks is not done by data link layer?
a) framing
b) error control
c) flow control
d) channel coding

Answer: channel coding


72. Which sublayer of the data link layer performs data link functions that depend
upon the type of medium?
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) error control sublayer

Answer: media access control sublayer

73. Header of a frame generally contains ______________


a) synchronization bytes
b) addresses
c) frame identifier
d) all of the mentioned

Answer: all of the mentioned

74. Automatic repeat request error management mechanism is provided by ________


a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) application access control sublayer

Answer: logical link control sublayer

75. When 2 or more bits in a data unit has been changed during the transmission,
the error is called ____________
a) random error
b) burst error
c) inverted error
d) double error

Answer: burst error

76. CRC stands for __________


a) cyclic redundancy check
b) code repeat check
c) code redundancy check
d) cyclic repeat check

Answer: cyclic redundancy check

77. Which of the following is a data link protocol?


a) ethernet
b) point to point protocol
c) hdlc
d) all of the mentioned

Answer: all of the mentioned

78. Which of the following is the multiple access protocol for channel access
control?
a) CSMA/CD
b) CSMA/CA
c) Both CSMA/CD & CSMA/CA
d) HDLC
Answer: Both CSMA/CD & CSMA/CA

79. The technique of temporarily delaying outgoing acknowledgements so that they


can be hooked onto the next outgoing data frame is called ____________
a) piggybacking
b) cyclic redundancy check
c) fletcher’s checksum
d) parity check

Answer: piggybacking

80. Physical or logical arrangement of network is __________


a) Topology
b) Routing
c) Networking
d) Control

Answer: Topology

81. Which network topology requires a central controller or hub?


a) Star
b) Mesh
c) Ring
d) Bus

Answer: Star

82. _______ topology requires a multipoint connection.


a) Star
b) Mesh
c) Ring
d) Bus

Answer: Bus

83. Data communication system spanning states, countries, or the whole world is
________
a) LAN
b) WAN
c) MAN
d) PAN

Answer: WAN

84. Data communication system within a building or campus is________


a) LAN
b) WAN
c) MAN
d) PAN

Answer: LAN

85. WAN stands for __________


a) World area network
b) Wide area network
c) Web area network
d) Web access network

Answer: Wide area network

86. In TDM, slots are further divided into __________


a) Seconds
b) Frames
c) Packets
d) Bits

Answer: Frames

87. _____ is the multiplexing technique that shifts each signal to a different
carrier frequency.
a) FDM
b) TDM
c) Both FDM & TDM
d) PDM

Answer: FDM

88. The sharing of a medium and its link by two or more devices is called _________
a) Fully duplexing
b) Multiplexing
c) Micropleixng
d) Duplexing

Answer: Multiplexing

89. Multiplexing is used in _______


a) Packet switching
b) Circuit switching
c) Data switching
d) Packet & Circuit switching

Answer: Circuit switching

90. Which multiplexing technique used to transmit digital signals?


a) FDM
b) TDM
c) WDM
d) FDM & WDM

Answer: TDM

91. Which of this is not a guided media?


a) Fiber optical cable
b) Coaxial cable
c) Wireless LAN
d) Copper wire

Answer: Wireless LAN

92. UTP is commonly used in __________


a) DSL
b) FTTP
c) HTTP
d) None of the mentioned
Answer: DSL

93. Coaxial cable consists of _______ concentric copper conductors.


a) 1
b) 2
c) 3
d) 4

Answer: 2

94. Fiber optics posses following properties __________


a) Immune electromagnetic interference
b) Very less signal attenuation
c) Very hard to tap
d) All of the mentioned

Answer: All of the mentioned

95. If an Optical Carrier is represented as OC-n, generally the link speed


equals(in Mbps) __________
a) n*39.8
b) n*51.8
c) 2n*51.8
d) None of the mentioned

Answer: n*51.8

96. Terrestrial radio channels are broadly classifed into _____ groups.
a) 2
b) 3
c) 4
d) 1

Answer: 3
97. Radio channels are attractive medium because ______________
a) Can penetrate walls
b) Connectivity can be given to mobile user
c) Can carry signals for long distance
d) All of the mentioned

Answer: All of the mentioned

98. Geostationary satellites ___________


a) Are placed at a fixed point above the earth
b) Rotate the earth about a fixed axis
c) Rotate the earth about a varying axis
d) All of the mentioned

Answer: Are placed at a fixed point above the earth

99. Packet sniffers involve ____________


a) Active receiver
b) Passive receiver
c) Legal receiver
d) Partially-active receiver

Answer: Passive receiver

100. Firewalls are often configured to block ___________


a) UDP traffic
b) TCP traffic
c) Sensitive traffic
d) Best-effort traffic
Answer: UDP traffic

You might also like