Networks
Networks
Object10
12
11
9
8
7
6
4
3
2
1
SOLVED.
JUST FOR 3000, OHH SORRY I MEANT 300 :)
FULL REFUND IF NOT SATISFIED
2. What is internet?
a) A network of interconnected local area networks
b) A collection of unrelated computers
c) Interconnection of wide area networks
d) A single network
4. Which of the following computer networks is built on the top of another network?
a) overlay network
b) prime network
c) prior network
d) chief network
5. What is the full form of OSI?
a) optical service implementation
b) open service Internet
c) open system interconnection
d) operating system interface
6. When a collection of various computers appears as a single coherent system to its clients, what is
this called?
a) mail system
b) networking system
c) computer network
d) distributed system
7. How many layers are there in the ISO OSI reference model?
a) 7
b) 5
c) 4
d) 6
12. What is the term for an endpoint of an inter-process communication flow across a computer
network?
a) port
b) machine
c) socket
d) pipe
13. How do two devices become part of a network?
a) PIDs of the processes running of different devices are same
b) a process in one device is able to exchange information with a process in another device
c) a process is active and another is inactive
d) a process is running on both devices
14. Which layer does the data link layer take packets from and encapsulate them into frames for
transmission?
a) transport layer
b) application layer
c) network layer
d) physical layer
15. Which of this is not a network edge device?
a) Switch
b) PC
c) Smartphones
d) Servers
16. Which type of network shares the communication channel among all the machines?
a) anycast network
b) multicast network
c) unicast network
d) broadcast network
17. Which topology requires a multipoint connection?
a) Ring
b) Bus
c) Star
d) Mesh
18. Which of the following maintains the Domain Name System?
a) a single server
b) a single computer
c) distributed database system
d) none of the mentioned
19. When discussing IDS/IPS, what is a signature?
a) It refers to “normal,” baseline network behavior
b) It is used to authorize the users on a network
c) An electronic signature used to authenticate the identity of a user on the network
d) Attack-definition file
24. What is the term for the data communication system within a building or campus?
a) MAN
b) LAN
c) PAN
d) WAN
25. What was the name of the first network?
a) ASAPNET
b) ARPANET
c) CNNET
d) NSFNET
26. Which of the following is the network layer protocol for the internet?
a) hypertext transfer protocol
b) file transfer protocol
c) ethernet
d) internet protocol
27. Which network topology requires a central controller or hub?
a) Ring
b) Bus
c) Star
d) Mesh
28. If a link transmits 4000 frames per second, and each slot has 8 bits, what is the transmission
rate of the circuit using Time Division Multiplexing (TDM)?
a) 500kbps
b) 32kbps
c) 32bps
d) 500bps
29. Which of the following allows LAN users to share computer programs and data?
a) File server
b) Network
c) Communication server
d) Print server
30. What type of transmission is involved in communication between a computer and a keyboard?
a) Half-duplex
b) Full-duplex
c) Simplex
d) Automatic
39. Which of the following routing algorithms can be used for network layer design?
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of the mentioned
41. A subset of a network that includes all the routers but contains no loops is called ________
a) spanning tree
b) spider structure
c) spider tree
d) special tree
42. Which one of the following algorithm is not used for congestion control?
a) traffic aware routing
b) admission control
c) load shedding
d) routing information protocol
48. Which of the following is not a name for MAC(Media Access Control) in data link layer?
a) Burned-in-address
b) Hardware address
c) Physical address
d) Logical address
49. What is the size of MAC address in medium access control sub layer?
a) 48 bytes
b) 48 bits
c) 32 bits
d) 32 bytes
53. Which of the following hardware in our computer is embedded with MAC address?
a) Keyboard
b) NIC
c) Chip
d) Driver
54. How many octets are dedicated to OUI(Organizationally unique identifier) in in 48 MAC address
space?
a) 5
b) 3
c) 2
d) 4
Object 13
55. Nodes in a network(router) has only one MAC address in the network.
a) True
b) False
56. Which of these is not applicable for IP protocol?
a) Connectionless
b) Offer reliable service
c) Offer unreliable service
d) Does not offer error reporting
59. In classless addressing, there are no classes but addresses are still granted in ______
a) IPs
b) Blocks
c) Codes
d) Sizes
68. Application developer has permission to decide the following on transport layer side
a) Transport layer protocol
b) Maximum buffer size
c) Both Transport layer protocol and Maximum buffer size
d) None of the mentioned
77. The ____________ translates internet domain and host names to IP address.
a) domain name system
b) routing information protocol
c) network time protocol
d) internet relay chat
78. Which one of the following allows a user at one site to establish a connection to another site and
then pass keystrokes from local host to remote host?
a) HTTP
b) FTP
c) Telnet
d) TCP
80. Which one of the following protocol delivers/stores mail to reciever server?
a) simple mail transfer protocol
b) post office protocol
c) internet mail access protocol
d) hypertext transfer protocol
82. Which one of the following is an internet standard protocol for managing devices on IP network?
a) dynamic host configuration protocol
b) simple network management protocol
c) internet message access protocol
d) media gateway protocol
84. Which protocol is a signaling communication protocol used for controlling multimedia
communication sessions?
a) session initiation protocol
b) session modelling protocol
c) session maintenance protocol
d) resource reservation protocol
85. Which one of the following is not correct?
a) Application layer protocols are used by both source and destination devices during a
communication session
b) HTTP is a session layer protocol
c) TCP is an application layer protocol
d) All of the mentioned
86. When displaying a web page, the application layer uses the _____________
a) HTTP protocol
b) FTP protocol
c) SMTP protocol
d) TCP protocol
87. Transport layer aggregates data from different applications into a single stream before passing it
to ____________
a) network layer
b) data link layer
c) application layer
d) physical layer
88. Which of the following are transport layer protocols used in networking?
a) TCP and FTP
b) UDP and HTTP
c) TCP and UDP
d) HTTP and FTP
91. Which one of the following is a version of UDP with congestion control?
a) datagram congestion control protocol
b) stream control transmission protocol
c) structured stream transport
d) user congestion control protocol
92. A _____ is a TCP name for a transport service access point.
a) port
b) pipe
c) node
d) protocol
93. Transport layer protocols deals with ____________
a) application to application communication
b) process to process communication
c) node to node communication
d) man to man communication
100. Frame Relay does not provide flow or error control, they must be provided by the ______
a) Lower Level Protocol
b) Highest Level Protocol
c) Upper Level Protocol
d) Lowest Level Protocol