0% found this document useful (0 votes)
3 views

Chapter-5 Introduction to computer networks and physical layer

The document provides an overview of the OSI model and the functions of various layers, particularly focusing on the Physical and Data Link layers. It includes questions and answers related to networking concepts, devices, and protocols, explaining their roles and characteristics. Key topics include signal transmission, error detection, addressing, and the differences between networking devices.

Uploaded by

sanjeevrawal83
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Chapter-5 Introduction to computer networks and physical layer

The document provides an overview of the OSI model and the functions of various layers, particularly focusing on the Physical and Data Link layers. It includes questions and answers related to networking concepts, devices, and protocols, explaining their roles and characteristics. Key topics include signal transmission, error detection, addressing, and the differences between networking devices.

Uploaded by

sanjeevrawal83
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

Introduction to Computer Network and Physical Layer 5: Which layer in the OSI model is responsible for converting digital

signals into electrical, optical, or radio signals?


1: Which of the following is the standard model used for network A) Data Link Layer
communication? B) Transport Layer
A) TCP/IP Model C) Physical Layer
B) OSI Model D) Network Layer
C) HTTP Model Answer: C) Physical Layer
D) SMTP Model Explanation: The physical layer translates digital signals into forms
Answer: B) OSI Model suitable for transmission over physical media.
Explanation: The OSI (Open Systems Interconnection) model is a
conceptual framework used to understand and standardize network 6: Which of these is NOT a function of the network layer?
communication. A) Routing
B) Addressing
2: What is the main function of the physical layer in the OSI model? C) Multiplexing
A) Data encryption D) Packet forwarding
B) Error detection and correction Answer: C) Multiplexing
C) Transmission of raw bits over a medium Explanation: Multiplexing is performed at the transport layer, not the
D) Address resolution network layer.
Answer: C) Transmission of raw bits over a medium
Explanation: The physical layer deals with transmitting raw data bits 7: What is the purpose of the TCP/IP model?
across a physical medium like cables or wireless signals. A) To define hardware specifications
B) To provide end-to-end communication
3: Which device operates at the physical layer of the OSI model? C) To secure data transmission
A) Router D) To design application-layer protocols
B) Hub Answer: B) To provide end-to-end communication
C) Switch Explanation: The TCP/IP model provides guidelines for transmitting
D) Firewall data reliably across networks.
Answer: B) Hub
Explanation: A hub operates at the physical layer by forwarding 8: Which of the following is NOT a networking device?
signals to all connected devices without analyzing them. A) Hub
B) Switch
4: What is the primary role of the data link layer in networking? C) Multimeter
A) Packet routing D) Router
B) Addressing and routing Answer: C) Multimeter
C) Error detection and correction Explanation: A multimeter is an electrical measurement tool, not a
D) Application-layer protocols networking device.
Answer: C) Error detection and correction
Explanation: The data link layer ensures reliable transmission of data 9: In the OSI model, which layer is responsible for providing error-
frames between two nodes on the same physical network. free communication between adjacent nodes?
A) Data Link Layer 13: Which of the following is an example of transmission media?
B) Physical Layer A) IP address
C) Transport Layer B) Ethernet cable
D) Network Layer C) Firewall
Answer: A) Data Link Layer D) Subnet mask
Explanation: The data link layer ensures error-free communication Answer: B) Ethernet cable
between devices on the same network. Explanation: Transmission media, such as Ethernet cables or wireless
signals, carry data between devices.
10: What is the key difference between a switch and a hub?
A) A hub sends data to all connected devices, while a switch sends 14: In networking, which device connects multiple LANs and operates
data to the specific device. at the network layer?
B) A hub operates at the transport layer, while a switch operates at the A) Hub
application layer. B) Bridge
C) A hub is faster than a switch. C) Router
D) A switch is only used in wireless networks. D) Switch
Answer: A) A hub sends data to all connected devices, while a switch Answer: C) Router
sends data to the specific device. Explanation: Routers connect multiple networks and direct data
Explanation: Switches use MAC addresses to forward data to the packets based on their destination.
correct device, unlike hubs, which broadcast to all devices.
15: Which of these is NOT part of the physical layer's function?
11: Which of the following is a primary function of a router? A) Transmission of raw bitstreams
A) Packet forwarding between networks B) Signal encoding and modulation
B) Converting digital signals to analog C) Frame synchronization
C) Encrypting data for secure transmission D) Signal reception
D) Detecting and correcting errors in frames Answer: C) Frame synchronization
Answer: A) Packet forwarding between networks Explanation: Frame synchronization is part of the data link layer, not
Explanation: Routers operate at the network layer to forward packets the physical layer.
between different networks.
16: What is the purpose of the TCP/IP model's link layer?
12: What is the main function of the MAC (Media Access Control) A) Provide end-to-end communication
sublayer? B) Manage error correction and addressing for local delivery
A) Defining hardware addresses C) Handle logical addressing
B) Routing data packets D) Encrypt data packets
C) Error detection in the network layer Answer: B) Manage error correction and addressing for local delivery
D) Securing data communication Explanation: The link layer ensures reliable communication between
Answer: A) Defining hardware addresses adjacent nodes.
Explanation: The MAC sublayer manages access to the physical
medium and assigns hardware addresses. 17: What is the role of switches in a network?
A) Amplifying signals
B) Forwarding data to specific devices using MAC addresses B) Cost-effective and easy to install
C) Routing data between different networks C) Used only in wireless networks
D) Connecting networks to the internet D) Requires shielding to function properly
Answer: B) Forwarding data to specific devices using MAC addresses Answer: B) Cost-effective and easy to install
Explanation: Switches use MAC addresses to direct data to the correct Explanation: UTP cables are widely used due to their low cost and
device within a network. ease of installation.

18: What does "duplex" mean in networking? 22: Which network device is used to divide a single network into
A) The speed of data transmission smaller segments?
B) The direction of data transmission A) Hub
C) The physical medium used B) Bridge
D) The encryption method applied C) Switch
Answer: B) The direction of data transmission D) Repeater
Explanation: Duplex refers to whether communication is one-way Answer: B) Bridge
(simplex) or two-way (half/full-duplex). Explanation: Bridges operate at the data link layer to divide a network
into smaller, manageable segments.
19: In the OSI model, which layer handles the transmission medium?
A) Application Layer 23: Which layer in the OSI model ensures reliable data delivery?
B) Data Link Layer A) Physical Layer
C) Physical Layer B) Transport Layer
D) Network Layer C) Network Layer
Answer: C) Physical Layer D) Data Link Layer
Explanation: The physical layer is responsible for the medium and Answer: B) Transport Layer
transmission of signals. Explanation: The transport layer ensures end-to-end reliability through
error detection and correction.
20: What is the maximum number of layers in the OSI model?
A) 5 24: What does a repeater do in a network?
B) 6 A) Amplifies and regenerates signals
C) 7 B) Routes packets between networks
D) 8 C) Secures data during transmission
Answer: C) 7 D) Converts protocols
Explanation: The OSI model consists of seven layers: Physical, Data Answer: A) Amplifies and regenerates signals
Link, Network, Transport, Session, Presentation, and Application. Explanation: Repeaters extend network reach by amplifying weak
signals.

25: Which networking device is used to forward data based on IP


21: What is the main characteristic of unshielded twisted pair (UTP) addresses?
cables? A) Switch
A) High resistance to electromagnetic interference B) Router
C) Hub D) UDP
D) Bridge Answer: B) DNS
Answer: B) Router Explanation: DNS (Domain Name System) resolves domain names to
Explanation: Routers use IP addresses to direct data between different their corresponding IP addresses.
networks.
30: What is the main advantage of a star topology?
26: What is the purpose of the collision domain in networking? A) Easy to add or remove devices without affecting the network
A) To limit interference between devices B) Less cable usage compared to other topologies
B) To identify faulty cables C) No single point of failure
C) To restrict data transmission to one device at a time D) Faster signal transmission over large distances
D) To provide encryption Answer: A) Easy to add or remove devices without affecting the
Answer: C) To restrict data transmission to one device at a time network
Explanation: A collision domain ensures that only one device Explanation: In a star topology, each device connects to a central hub,
transmits data at a time in shared networks. making changes easier.

27: What type of network device is responsible for connecting


different types of networks, such as LANs and WANs?
A) Bridge
B) Gateway Data Link Layer
C) Repeater
D) Switch 1: What is the primary responsibility of the Data Link Layer in the
Answer: B) Gateway OSI model?
Explanation: A gateway connects networks using different protocols A) Routing data between networks
or architectures. B) Establishing and managing physical connections
C) Ensuring error-free transmission between adjacent nodes
28: What is the purpose of a MAC address in networking? D) Encrypting and decrypting data packets
A) To assign IP addresses to devices Answer: C) Ensuring error-free transmission between adjacent nodes
B) To uniquely identify devices at the hardware level Explanation: The Data Link Layer provides reliable data transfer by
C) To encrypt data detecting and correcting errors.
D) To manage network topology
Answer: B) To uniquely identify devices at the hardware level 2: What type of addressing is used in the Data Link Layer?
Explanation: MAC addresses are unique hardware identifiers for A) Logical addressing
network interfaces. B) Physical addressing
C) Network addressing
29: Which protocol is responsible for translating domain names into IP D) Host addressing
addresses? Answer: B) Physical addressing
A) HTTP Explanation: The Data Link Layer uses MAC addresses, which are
B) DNS physical addresses assigned to hardware.
C) TCP
3: What protocol is responsible for mapping IP addresses to MAC B) To identify and correct errors in transmitted data
addresses? C) To establish physical connections
A) DNS D) To ensure proper encryption of data
B) ARP Answer: B) To identify and correct errors in transmitted data
C) ICMP Explanation: Error detection techniques, like checksums and CRC,
D) RIP identify transmission errors.
Answer: B) ARP
Explanation: The Address Resolution Protocol (ARP) maps IP 8: What is the main function of PPP (Point-to-Point Protocol)?
addresses to MAC addresses. A) It manages IP address allocation.
B) It provides error correction in wireless networks.
4: What is the main purpose of flow control in the Data Link Layer? C) It enables data transfer over point-to-point links.
A) Preventing collisions in shared networks D) It encrypts data during transmission.
B) Ensuring that a sender does not overwhelm a receiver Answer: C) It enables data transfer over point-to-point links.
C) Encrypting data before transmission Explanation: PPP is used for direct communication between two
D) Translating IP addresses devices over a physical link.
Answer: B) Ensuring that a sender does not overwhelm a receiver
Explanation: Flow control manages data transmission rates to match 9: Which IEEE standard defines Ethernet (802.3)?
sender and receiver speeds. A) IEEE 802.1
B) IEEE 802.2
5: Which of the following is a characteristic of CSMA/CD? C) IEEE 802.3
A) It is used in wireless networks. D) IEEE 802.11
B) It prevents collisions from occurring. Answer: C) IEEE 802.3
C) It detects and resolves collisions in wired networks. Explanation: IEEE 802.3 is the standard for Ethernet, which is a
D) It ensures end-to-end reliability. widely used LAN technology.
Answer: C) It detects and resolves collisions in wired networks.
Explanation: CSMA/CD (Carrier Sense Multiple Access with 10: What does CSMA/CA stand for?
Collision Detection) is used in Ethernet networks to manage collisions. A) Carrier Sense Multiple Access with Collision Avoidance
B) Carrier Sense Multiple Access with Collision Authorization
6: What does the term "framing" refer to in the Data Link Layer? C) Carrier Sense Multiple Access with Connection Allocation
A) Dividing data into manageable packets for transmission D) Carrier Sense Multiple Access with Code Assignment
B) Encapsulating data with headers and trailers Answer: A) Carrier Sense Multiple Access with Collision Avoidance
C) Encrypting data for secure transmission Explanation: CSMA/CA is used in wireless networks to avoid
D) Compressing data to reduce size collisions before they occur.
Answer: B) Encapsulating data with headers and trailers
Explanation: Framing adds headers and trailers to data for 11: What is the primary function of the MAC sublayer in the Data
identification and synchronization. Link Layer?
A) Addressing and error detection
7: What is the purpose of error detection in the Data Link Layer? B) Managing access to the physical medium
A) To route packets to the correct destination C) Routing data packets
D) Fragmenting large data packets Answer: A) To identify devices uniquely within a local network
Answer: B) Managing access to the physical medium Explanation: LAN addressing uses MAC addresses to identify devices
Explanation: The MAC (Media Access Control) sublayer handles in a local area network.
channel access and collision management.
16: Which of the following is NOT a function of the Data Link Layer?
12: Which protocol is commonly used for wireless LANs in the Data A) Error detection
Link Layer? B) Physical addressing
A) Ethernet C) Packet routing
B) PPP D) Flow control
C) CSMA/CA Answer: C) Packet routing
D) Token Ring Explanation: Packet routing is a function of the Network Layer, not
Answer: C) CSMA/CA the Data Link Layer.
Explanation: CSMA/CA is the protocol used in wireless LANs to
avoid collisions. 17: What is the function of the FCS (Frame Check Sequence) in a
frame?
13: What does the term "sliding window protocol" refer to? A) To ensure data encryption
A) A method for error correction B) To detect transmission errors
B) A flow control mechanism C) To provide routing information
C) A network layer routing technique D) To control access to the network
D) A physical layer communication method Answer: B) To detect transmission errors
Answer: B) A flow control mechanism Explanation: FCS is a field in the frame used for error detection.
Explanation: Sliding window protocols allow efficient flow control by
managing the number of frames sent before acknowledgment. 18: Which topology is commonly associated with Token Ring
networks?
14: Which protocol allows multiple devices to share the same A) Star
communication medium? B) Bus
A) ARP C) Ring
B) Ethernet D) Mesh
C) PPP Answer: C) Ring
D) DNS Explanation: Token Ring networks use a ring topology where tokens
Answer: B) Ethernet circulate to control access.
Explanation: Ethernet supports multiple devices on a shared medium
using protocols like CSMA/CD. 19: Which technique is used in IEEE 802.4 (Token Bus) for medium
access control?
15: What is the purpose of LAN addressing in the Data Link Layer? A) Time division
A) To identify devices uniquely within a local network B) Token passing
B) To determine the shortest route to a destination C) CSMA/CD
C) To assign logical addresses to devices D) Polling
D) To encrypt and decrypt data packets Answer: B) Token passing
Explanation: Token Bus uses token passing to manage medium access Explanation: Error correction techniques, like Hamming codes, ensure
in a logical bus structure. data integrity.

20: Which protocol is used for frame synchronization in Ethernet? 24: What type of addressing does Ethernet use for communication?
A) Start-of-Frame Delimiter (SFD) A) Logical addressing
B) Address Resolution Protocol (ARP) B) Hierarchical addressing
C) Point-to-Point Protocol (PPP) C) Flat addressing
D) Network Time Protocol (NTP) D) Physical addressing
Answer: A) Start-of-Frame Delimiter (SFD) Answer: D) Physical addressing
Explanation: SFD indicates the beginning of a frame for Explanation: Ethernet uses MAC addresses, which are physical
synchronization in Ethernet. addresses.

21: What is the purpose of "acknowledgment" in data transmission at 25: What is the function of the Stop-and-Wait ARQ protocol?
the Data Link Layer? A) To optimize routing in a network
A) To establish a secure connection B) To implement error correction
B) To confirm successful frame reception C) To ensure flow control by sending one frame at a time
C) To encrypt transmitted data D) To resolve address conflicts
D) To prioritize specific packets Answer: C) To ensure flow control by sending one frame at a time
Answer: B) To confirm successful frame reception Explanation: Stop-and-Wait ARQ ensures data transmission in a step-
Explanation: Acknowledgment ensures that data frames have been by-step manner with acknowledgments.
received correctly by the recipient.
26: Which type of communication is supported by PPP (Point-to-Point
22: Which of the following is a wireless LAN protocol defined by Protocol)?
IEEE? A) Multicast communication
A) IEEE 802.11 B) Point-to-multipoint communication
B) IEEE 802.3 C) Point-to-point communication
C) IEEE 802.4 D) Broadcast communication
D) IEEE 802.5 Answer: C) Point-to-point communication
Answer: A) IEEE 802.11 Explanation: PPP is designed for direct communication between two
Explanation: IEEE 802.11 defines wireless LAN (Wi-Fi) standards. devices.

23: What is the primary role of error correction in the Data Link 27: What does the term "collision domain" refer to in Ethernet
Layer? networks?
A) To detect and correct errors in the received data A) A network segment where multiple devices share the same physical
B) To optimize data routing medium
C) To establish logical connections B) A region where wireless interference occurs
D) To control access to the physical medium C) An isolated segment of a WAN
Answer: A) To detect and correct errors in the received data D) A virtual private network segment
Answer: A) A network segment where multiple devices share the
same physical medium A) Physical data transmission
Explanation: A collision domain is a segment where collisions can B) Logical addressing and routing
occur in a shared medium. C) Session management
D) Encryption and decryption of data
28: Which feature distinguishes IEEE 802.5 (Token Ring) from IEEE Answer: B) Logical addressing and routing
802.3 (Ethernet)? Explanation: The Network Layer is responsible for assigning IP
A) Use of MAC addressing addresses and determining the best path for data delivery.
B) Use of token-passing access control
C) Support for wireless networks 2: Which protocol is responsible for mapping IP addresses to MAC
D) Support for bus topology addresses?
Answer: B) Use of token-passing access control A) ARP
Explanation: Token Ring uses token-passing, whereas Ethernet uses B) RIP
CSMA/CD. C) ICMP
D) OSPF
29: What does the acronym "PPP" stand for in data communication? Answer: A) ARP
A) Packet Protocol Processor Explanation: ARP (Address Resolution Protocol) translates IP
B) Point-to-Point Protocol addresses into MAC addresses.
C) Physical Packet Protocol
D) Public Processing Protocol 3: What does the term "subnetting" mean in the context of the
Answer: B) Point-to-Point Protocol Network Layer?
Explanation: PPP facilitates direct communication between two A) Splitting a network into smaller segments
points. B) Encrypting data at the transport layer
C) Reducing packet collisions in the physical layer
30: Which of the following is a Wide Area Protocol supported by the D) Establishing a virtual private network
Data Link Layer? Answer: A) Splitting a network into smaller segments
A) Ethernet Explanation: Subnetting helps divide larger networks into smaller,
B) Token Ring manageable sub-networks.
C) PPP
D) Wi-Fi 4: Which of the following is a dynamic routing protocol?
Answer: C) PPP A) OSPF
Explanation: PPP is commonly used in WAN environments for data B) CSMA/CD
communication. C) PPP
D) Token Ring
Answer: A) OSPF
Explanation: OSPF (Open Shortest Path First) is a dynamic routing
Network Layer protocol used in IP networks.

1: What is the primary purpose of the Network Layer in the OSI 5: What is the purpose of IPv6 compared to IPv4?
model? A) To provide a smaller address space
B) To eliminate logical addressing B) To route packets within a local network
C) To support a larger number of devices with extended address space C) To exchange routing information between autonomous systems
D) To replace the Transport Layer protocols D) To encrypt data in transit
Answer: C) To support a larger number of devices with extended Answer: C) To exchange routing information between autonomous
address space systems
Explanation: IPv6 provides a 128-bit address space, supporting a vast Explanation: BGP is used for routing between different administrative
number of devices. domains on the Internet.

6: What is the role of a router at the Network Layer? 10: What does "classful addressing" mean in the Network Layer?
A) To establish a physical connection A) Dividing an IP address into fixed blocks or classes
B) To filter malicious packets B) Allocating addresses dynamically based on demand
C) To forward packets between different networks C) Encrypting IP addresses for security
D) To synchronize application sessions D) Reusing addresses within a subnet
Answer: C) To forward packets between different networks Answer: A) Dividing an IP address into fixed blocks or classes
Explanation: Routers use IP addresses to direct packets to their Explanation: Classful addressing divides IP addresses into predefined
destination networks. classes (A, B, C, etc.).

7: What type of routing is used when each router maintains a complete 11: What is the primary function of the default gateway in a network?
topology of the network? A) To resolve domain names
A) Distance vector routing B) To route packets to external networks
B) Link state routing C) To act as a firewall
C) Static routing D) To allocate IP addresses
D) Default routing Answer: B) To route packets to external networks
Answer: B) Link state routing Explanation: The default gateway forwards packets from the local
Explanation: In link state routing, each router has a full map of the network to other networks.
network topology, as used in OSPF.
12: Which IPv6 feature eliminates the need for NAT (Network
8: Which protocol is used to send error and control messages in the Address Translation)?
Network Layer? A) Auto-configuration
A) TCP B) Vast address space
B) ICMP C) Multicast addressing
C) ARP D) Mobility support
D) DNS Answer: B) Vast address space
Answer: B) ICMP Explanation: IPv6’s large address space provides unique addresses for
Explanation: ICMP (Internet Control Message Protocol) is used for every device, removing the need for NAT.
error reporting and diagnostics.
13: Which of the following protocols is distance-vector-based?
9: What is the primary function of BGP (Border Gateway Protocol)? A) OSPF
A) To manage domain name resolution B) RIP
C) EIGRP Answer: C) 128 bits
D) MPLS Explanation: IPv6 uses 128-bit addresses, allowing for a significantly
Answer: B) RIP larger address space.
Explanation: RIP (Routing Information Protocol) is a distance-vector
protocol that shares routing information periodically. 18: What does the acronym CIDR stand for?
A) Classless Inter-Domain Routing
14: What is the primary limitation of RIP as a routing protocol? B) Centralized Internet Data Routing
A) Incompatibility with IPv6 C) Critical Infrastructure Data Routing
B) High CPU usage D) Cached Internet Domain Resources
C) Maximum hop count of 15 Answer: A) Classless Inter-Domain Routing
D) Lack of encryption Explanation: CIDR replaces classful addressing and allows flexible
Answer: C) Maximum hop count of 15 allocation of IP address space.
Explanation: RIP has a maximum hop limit of 15, making it unsuitable
for large networks. 19: Which protocol is used to exchange routing updates between
routers in the same autonomous system?
15: What type of IP address is 192.168.1.1? A) BGP
A) Public IP address B) EIGRP
B) Multicast address C) DHCP
C) Private IP address D) FTP
D) Loopback address Answer: B) EIGRP
Answer: C) Private IP address Explanation: EIGRP (Enhanced Interior Gateway Routing Protocol) is
Explanation: IP addresses in the range 192.168.x.x are reserved for used within a single autonomous system.
private networks.
20: What is a "multicast" IP address used for?
16: In IPv6, what is the purpose of an extension header? A) Sending packets to a single host
A) To increase header size B) Broadcasting packets to all hosts
B) To provide additional functionality like routing and fragmentation C) Sending packets to a specific group of hosts
C) To encrypt the packet D) Routing packets between routers
D) To replace the TCP header Answer: C) Sending packets to a specific group of hosts
Answer: B) To provide additional functionality like routing and Explanation: Multicast addresses enable communication with a group
fragmentation of devices on a network.
Explanation: IPv6 extension headers enable optional features such as
routing and security. 21: What is the primary advantage of IPv6 over IPv4?
A) Reduced packet header size
17: What is the size of an IPv6 address? B) Faster transmission speed
A) 32 bits C) Larger address space
B) 64 bits D) Improved routing protocols
C) 128 bits Answer: C) Larger address space
D) 256 bits
Explanation: IPv6 offers a significantly larger address space, 26: Which of the following is NOT a routing algorithm?
accommodating more devices. A) Shortest path algorithm
B) Distance vector routing
22: Which protocol is responsible for managing network congestion at C) Link state routing
the Network Layer? D) Multiplexing algorithm
A) ICMP Answer: D) Multiplexing algorithm
B) OSPF Explanation: Multiplexing deals with data streams, not routing.
C) RIP
D) None of the above 27: What is the role of a gateway in a network?
Answer: A) ICMP A) To route traffic within the same subnet
Explanation: ICMP is used for error reporting and managing network B) To provide a connection between different networks
congestion. C) To assign IP addresses dynamically
D) To encrypt network traffic
23: What is the primary use of a subnet mask? Answer: B) To provide a connection between different networks
A) To encrypt data packets Explanation: A gateway enables communication between different
B) To separate network and host portions of an IP address networks or protocols.
C) To route packets between subnets
D) To assign IP addresses dynamically 28: Which IPv6 address type is used for a single device?
Answer: B) To separate network and host portions of an IP address A) Anycast
Explanation: Subnet masks identify which part of an IP address refers B) Unicast
to the network and which to the host. C) Multicast
D) Broadcast
24: What is the main benefit of a hierarchical IP addressing scheme? Answer: B) Unicast
A) Easier packet fragmentation Explanation: Unicast addresses are assigned to individual devices for
B) Improved security one-to-one communication.
C) Scalability and efficient routing
D) Reduced hardware costs 29: What does the "Time to Live" (TTL) field in an IP header do?
Answer: C) Scalability and efficient routing A) Determines the lifespan of a packet in the network
Explanation: Hierarchical addressing simplifies routing and makes B) Encrypts packet data
networks scalable. C) Indicates the packet's destination
D) Specifies the packet size
25: What does the acronym ICMP stand for? Answer: A) Determines the lifespan of a packet in the network
A) Internet Control Messaging Protocol Explanation: TTL limits the number of hops a packet can take before
B) Internal Communication Management Protocol being discarded.
C) Inter-Cloud Messaging Platform
D) Inter-Computer Management Protocol 30: What is the main purpose of the IPv6 extension header "Hop-by-
Answer: A) Internet Control Messaging Protocol Hop Options"?
Explanation: ICMP is a protocol for sending control and error A) To encrypt packets at each hop
messages in the network. B) To specify options that must be processed by every router
C) To increase packet size dynamically 4: What is the purpose of port numbers in the Transport Layer?
D) To control data flow between applications A) To identify specific applications or processes
Answer: B) To specify options that must be processed by every router B) To encrypt data packets
Explanation: Hop-by-Hop Options headers are examined by every C) To allocate IP addresses
router along the packet's path. D) To define routing paths
Answer: A) To identify specific applications or processes
Explanation: Port numbers allow multiple applications to use the
network simultaneously.
Transport Layer
5: Which transport protocol is typically used for streaming video?
1: Which of the following protocols operates at the Transport Layer? A) TCP
A) FTP B) UDP
B) TCP C) FTP
C) HTTP D) Telnet
D) ICMP Answer: B) UDP
Answer: B) TCP Explanation: UDP is used for streaming because it prioritizes speed
Explanation: TCP (Transmission Control Protocol) provides reliable, over reliability.
connection-oriented communication at the Transport Layer.
6: What is the maximum size of a TCP header?
2: What is the primary purpose of the Transport Layer? A) 40 bytes
A) Routing packets between devices B) 60 bytes
B) Providing end-to-end communication C) 20 bytes
C) Resolving domain names D) 64 bytes
D) Encrypting data Answer: B) 60 bytes
Answer: B) Providing end-to-end communication Explanation: The TCP header can range from 20 to 60 bytes,
Explanation: The Transport Layer ensures reliable delivery of data depending on the presence of optional fields.
between hosts.
7: What mechanism does TCP use to ensure reliable delivery?
3: Which protocol is used for connectionless communication at the A) Checksum
Transport Layer? B) Flow control
A) TCP C) Acknowledgment and retransmission
B) UDP D) Encryption
C) ICMP Answer: C) Acknowledgment and retransmission
D) SMTP Explanation: TCP uses acknowledgment and retransmission to ensure
Answer: B) UDP reliable data delivery.
Explanation: UDP (User Datagram Protocol) provides connectionless
communication for fast and lightweight data transmission. 8: What does "three-way handshake" refer to in TCP?
A) Data retransmission process
B) Connection establishment process
C) Encryption process Explanation: Port 443 is used for secure HTTP (HTTPS)
D) Port scanning process communication.
Answer: B) Connection establishment process
Explanation: The three-way handshake (SYN, SYN-ACK, ACK) 13: What is the purpose of the "URG" flag in TCP?
establishes a reliable connection in TCP. A) To terminate the connection
B) To acknowledge receipt of data
9: What is the primary purpose of the sliding window mechanism in C) To indicate urgent data
TCP? D) To request retransmission
A) To encrypt data Answer: C) To indicate urgent data
B) To manage flow control and congestion Explanation: The URG flag signals that the data should be processed
C) To assign port numbers immediately.
D) To increase header size
Answer: B) To manage flow control and congestion 14: What does "flow control" mean in the context of the Transport
Explanation: Sliding window ensures efficient data transfer and avoids Layer?
congestion. A) Routing data between devices
B) Ensuring data is delivered without overwhelming the receiver
10: Which flag in a TCP header is used to terminate a connection? C) Encrypting network traffic
A) SYN D) Resolving domain names
B) FIN Answer: B) Ensuring data is delivered without overwhelming the
C) ACK receiver
D) PSH Explanation: Flow control prevents the sender from sending data
Answer: B) FIN faster than the receiver can process.
Explanation: The FIN flag is used to initiate connection termination.
15: Which protocol is used to establish remote terminal access?
11: What is multiplexing in the Transport Layer? A) HTTP
A) Dividing IP addresses B) UDP
B) Combining data streams from multiple applications C) Telnet
C) Encrypting transmitted data D) SMTP
D) Routing data packets Answer: C) Telnet
Answer: B) Combining data streams from multiple applications Explanation: Telnet operates at the Transport Layer to provide remote
Explanation: Multiplexing allows multiple applications to share a terminal access.
single network connection.
16: Which protocol is commonly used for sending email?
12: Which of the following is a common port number for HTTPS? A) FTP
A) 21 B) HTTP
B) 80 C) SMTP
C) 443 D) UDP
D) 25 Answer: C) SMTP
Answer: C) 443
Explanation: SMTP (Simple Mail Transfer Protocol) is used to send C) 49151
emails. D) 65535
Answer: D) 65535
17: What is the primary role of congestion control in TCP? Explanation: Port numbers range from 0 to 65535, with higher
A) To encrypt data packets numbers available for dynamic or private use.
B) To prevent excessive traffic on the network
C) To assign port numbers 22: What does the "ACK" flag in a TCP header signify?
D) To retransmit lost data A) Acknowledgment of data receipt
Answer: B) To prevent excessive traffic on the network B) Termination of connection
Explanation: Congestion control adjusts the data flow to avoid C) Error detection
overwhelming the network. D) Urgent data processing
Answer: A) Acknowledgment of data receipt
18: Which of the following is a well-known port for FTP? Explanation: The ACK flag confirms successful receipt of data.
A) 21
B) 80 23: What does "MTU" stand for in the Transport Layer?
C) 443 A) Maximum Transfer Unit
D) 25 B) Medium Transmission Utility
Answer: A) 21 C) Minimum Transport Unit
Explanation: Port 21 is used for FTP control commands. D) Maximum Transmission Unit
Answer: D) Maximum Transmission Unit
19: What does the term "socket" refer to in the Transport Layer? Explanation: MTU refers to the largest packet size that can be sent
A) A device that connects networks over a network.
B) An IP address combined with a port number
C) A protocol for routing packets 24: What is the purpose of a checksum in TCP?
D) A hardware interface for network devices A) To route packets
Answer: B) An IP address combined with a port number B) To detect errors in data transmission
Explanation: A socket uniquely identifies a connection endpoint. C) To encrypt packets
D) To assign port numbers
20: Which protocol does not use a handshake mechanism? Answer: B) To detect errors in data transmission
A) TCP Explanation: The checksum verifies the integrity of the transmitted
B) UDP data.
C) FTP
D) HTTPS 25: What is the primary role of the PSH flag in a TCP header?
Answer: B) UDP A) To terminate the connection
Explanation: UDP is connectionless and does not use handshakes. B) To signal that the data should be sent immediately
C) To reset the connection
21: What is the maximum port number in TCP/UDP? D) To indicate urgent data
A) 1024 Answer: B) To signal that the data should be sent immediately
B) 16384
Explanation: The PSH flag forces the delivery of data to the receiving B) TCP provides reliable delivery, while UDP does not
application. C) UDP uses three-way handshakes, and TCP does not
D) TCP does not use port numbers, while UDP does
26: What does "connection-oriented" mean in TCP? Answer: B) TCP provides reliable delivery, while UDP does not
A) Data is sent without acknowledgment Explanation: TCP ensures reliability through acknowledgments, while
B) A reliable session is established before data transmission UDP does not guarantee delivery.
C) Data is encrypted before transmission
D) Packets are delivered out of order
Answer: B) A reliable session is established before data transmission
Explanation: TCP establishes a session before transmitting data. Application Layer Protocol
27: Which protocol is used to transfer files over a secure channel? 1: Which protocol is used for transferring web pages?
A) FTP A) FTP
B) SFTP B) HTTP
C) SMTP C) SMTP
D) HTTP D) SNMP
Answer: B) SFTP Answer: B) HTTP
Explanation: SFTP (Secure File Transfer Protocol) is a secure method Explanation: HTTP (Hypertext Transfer Protocol) is used for
of transferring files. transferring web pages.

28: What is the primary function of the RST flag in TCP? 2: Which of the following is a secure version of HTTP?
A) To encrypt the data A) FTP
B) To reset the connection B) HTTPS
C) To acknowledge data receipt C) SNMP
D) To indicate urgent data D) Telnet
Answer: B) To reset the connection Answer: B) HTTPS
Explanation: The RST flag resets an active connection. Explanation: HTTPS uses SSL/TLS for secure communication.

29: Which transport protocol supports multicast? 3: Which application layer protocol is used for email delivery?
A) TCP A) HTTP
B) UDP B) FTP
C) FTP C) SMTP
D) HTTP D) SSH
Answer: B) UDP Answer: C) SMTP
Explanation: UDP supports multicast by sending packets to a group of Explanation: SMTP (Simple Mail Transfer Protocol) is used to send
devices. emails.

30: What is the main difference between TCP and UDP?


A) UDP is connection-oriented, and TCP is not
4: Which protocol is used to retrieve email from a server? Answer: B) SSH
A) POP3 Explanation: SSH (Secure Shell) provides secure remote access.
B) SMTP
C) FTP 9: What is the default port number for HTTPS?
D) SNMP A) 80
Answer: A) POP3 B) 21
Explanation: POP3 (Post Office Protocol 3) is used for retrieving C) 443
emails. D) 25
Answer: C) 443
5: What is the default port number for FTP? Explanation: HTTPS uses port 443 for secure communication.
A) 21
B) 25 10: What does the acronym FTP stand for?
C) 80 A) File Transfer Protocol
D) 443 B) Fast Transmission Protocol
Answer: A) 21 C) File Transport Program
Explanation: FTP uses port 21 for control communication. D) File Translation Protocol
Answer: A) File Transfer Protocol
6: What is the primary purpose of DNS? Explanation: FTP is used for transferring files between computers.
A) Encrypting network traffic
B) Mapping domain names to IP addresses 11: Which protocol is used for peer-to-peer file sharing?
C) Sending emails A) DNS
D) Transferring files B) P2P
Answer: B) Mapping domain names to IP addresses C) FTP
Explanation: DNS resolves domain names to IP addresses. D) SMTP
Answer: B) P2P
7: What does SNMP stand for? Explanation: P2P (Peer-to-Peer) protocols enable direct file sharing
A) Simple Network Management Protocol between devices.
B) Secure Network Management Protocol
C) Standard Network Management Protocol 12: What is the primary function of the Application Layer?
D) System Network Monitoring Protocol A) Packet routing
Answer: A) Simple Network Management Protocol B) Data encryption
Explanation: SNMP is used for managing network devices. C) Providing network services to applications
D) Address translation
8: Which protocol is used for secure remote access to another Answer: C) Providing network services to applications
computer? Explanation: The Application Layer enables communication between
A) Telnet applications.
B) SSH
C) HTTP 13: Which protocol is used for real-time chat?
D) SMTP A) SMTP
B) IMAP Answer: B) Monitoring and analyzing network performance
C) XMPP Explanation: PRTG is a network monitoring tool.
D) FTP
Answer: C) XMPP 18: What does MRTG stand for?
Explanation: XMPP (Extensible Messaging and Presence Protocol) is A) Multi Router Traffic Grapher
used for instant messaging. B) Multiple Routing Table Generator
C) Managed Router Traffic Graph
14: What does IMAP stand for? D) Main Routing Table Grapher
A) Internet Messaging Application Protocol Answer: A) Multi Router Traffic Grapher
B) Internet Mail Access Protocol Explanation: MRTG is used for graphing network traffic data.
C) Instant Messaging Access Protocol
D) Integrated Messaging Application Protocol 19: Which protocol enables the transfer of files over the internet
Answer: B) Internet Mail Access Protocol without encryption?
Explanation: IMAP is used for accessing and managing email on a A) FTP
server. B) SFTP
C) HTTPS
15: What is the function of a packet analyzer like Wireshark? D) SSH
A) Encrypting network traffic Answer: A) FTP
B) Analyzing and capturing network traffic Explanation: FTP transfers files without encryption, unlike SFTP.
C) Sending emails
D) Resolving domain names 20: What is the function of PuTTY?
Answer: B) Analyzing and capturing network traffic A) File sharing
Explanation: Packet analyzers like Wireshark are used for B) Secure remote terminal access
troubleshooting and monitoring networks. C) Domain name resolution
D) Email management
16: Which protocol is used for directory services? Answer: B) Secure remote terminal access
A) FTP Explanation: PuTTY is used for accessing servers via SSH and Telnet.
B) DNS
C) LDAP 21: What does the acronym HTTP stand for?
D) SSH A) Hypertext Transfer Protocol
Answer: C) LDAP B) High Transfer Protocol
Explanation: LDAP (Lightweight Directory Access Protocol) is used C) Hypertext Transport Protocol
for accessing directory services. D) High Transport Protocol
Answer: A) Hypertext Transfer Protocol
17: What is the role of PRTG in network management? Explanation: HTTP is the foundation of web communication.
A) Encrypting network traffic
B) Monitoring and analyzing network performance 22: What is the main difference between HTTP and HTTPS?
C) Sending emails A) HTTPS uses encryption
D) Resolving IP addresses B) HTTP is faster than HTTPS
C) HTTPS does not use port numbers 27: Which protocol is used for real-time video conferencing?
D) HTTP supports more features A) HTTP
Answer: A) HTTPS uses encryption B) FTP
Explanation: HTTPS secures communication with SSL/TLS C) RTP
encryption. D) SNMP
Answer: C) RTP
23: What is the default port for SMTP? Explanation: RTP (Real-time Transport Protocol) supports video and
A) 80 voice communication.
B) 25
C) 21 28: What is the primary function of SNMP?
D) 443 A) Sending emails
Answer: B) 25 B) Monitoring and managing network devices
Explanation: SMTP uses port 25 for sending emails. C) Encrypting data
D) Resolving domain names
24: Which protocol is used for transferring files securely? Answer: B) Monitoring and managing network devices
A) FTP Explanation: SNMP gathers data about network devices for
B) SFTP monitoring.
C) HTTP
D) SMTP 29: What does the acronym TLS stand for?
Answer: B) SFTP A) Transport Layer Security
Explanation: SFTP encrypts data during file transfer. B) Transport Level System
C) Transmission Layer Service
25: Which protocol is used for accessing shared files on a local D) Transfer Link Security
network? Answer: A) Transport Layer Security
A) HTTP Explanation: TLS provides encryption for secure communication.
B) SMB
C) SNMP 30: Which tool is used for analyzing web traffic?
D) SMTP A) Telnet
Answer: B) SMB B) Wireshark
Explanation: SMB (Server Message Block) is used for accessing C) FTP
shared files. D) PRTG
Answer: B) Wireshark
26: What does DNS use to resolve domain names? Explanation: Wireshark captures and analyzes web traffic.
A) IP address cache
B) Routing tables
C) Name servers
D) Encryption algorithms
Answer: C) Name servers
Explanation: DNS relies on name servers to resolve domain names.
Network Security b) Denial of Service (DoS)
c) Spoofing
1) What is the main purpose of computer security? d) Man-in-the-Middle
a) To reduce system costs Answer: b
b) To protect data integrity, confidentiality, and availability Explanation: DoS attacks flood a system, preventing legitimate
c) To ensure fast network speeds use.
d) To install more software 6) What is the main feature of digital signatures?
Answer: b a) Confidentiality
Explanation: Computer security aims to safeguard information b) Authentication and integrity
and systems from threats. c) Faster encryption
2) Which of the following is a passive attack? d) Network scalability
a) Phishing Answer: b
b) Eavesdropping Explanation: Digital signatures verify authenticity and ensure
c) Malware injection data integrity.
d) Denial of Service 7) Which encryption method uses the same key for encryption
Answer: b and decryption?
Explanation: Passive attacks involve monitoring without a) Symmetric encryption
altering data. b) Asymmetric encryption
3) Which principle ensures only authorized users access c) Hashing
information? d) Digital signature
a) Integrity Answer: a
b) Availability Explanation: Symmetric encryption uses one key for both
c) Confidentiality processes.
d) Scalability 8) What is the primary purpose of PGP in email security?
Answer: c a) Spam filtering
Explanation: Confidentiality restricts data access to authorized b) Encrypting emails and verifying sender identity
individuals. c) Blocking malware
4) What type of algorithm is RSA? d) Improving email speeds
a) Symmetric Answer: b
b) Asymmetric Explanation: PGP encrypts emails and adds digital signatures.
c) Hashing 9) Which layer does IPsec operate at?
d) Stream Cipher a) Application layer
Answer: b b) Transport layer
Explanation: RSA uses a public and private key pair, making it c) Network layer
asymmetric. d) Data link layer
5) Which security attack disrupts services by overwhelming a Answer: c
system? Explanation: IPsec secures IP communications at the network
a) Phishing layer.
10) Which protocol secures TCP connections? Explanation: Firewalls filter traffic and block unauthorized
a) IPsec access.
b) SSL 15) Which encryption method is used in WEP?
c) HTTP a) AES
d) VPN b) RC4
Answer: b c) RSA
Explanation: SSL secures data transmission over TCP d) SHA-256
connections. Answer: b
11) What is the key concept of cryptography? Explanation: WEP uses RC4 for wireless encryption.
a) Data analysis 16) What does SSL ensure in network communication?
b) Data obfuscation and protection a) Faster communication
c) System backup b) Encrypted and secure data transmission
d) Faster processing c) Open-source protocols
Answer: b d) Reduced data size
Explanation: Cryptography secures communication by Answer: b
encoding data. Explanation: SSL encrypts data to ensure security.
12) What does VPN stand for? 17) Which attack tricks users into providing sensitive
a) Virtual Private Network information?
b) Verified Protocol Node a) Phishing
c) Variable Packet Network b) Brute force
d) Virtual Path Navigation c) Eavesdropping
Answer: a d) Spoofing
Explanation: VPN creates secure tunnels for private Answer: a
communication. Explanation: Phishing lures users to share confidential details.
13) Which algorithm is widely used in public key 18) What is a key feature of IPsec?
cryptography? a) Encrypts data at the transport layer
a) AES b) Secures communication at the network layer
b) RSA c) Filters application traffic
c) DES d) Provides physical device security
d) MD5 Answer: b
Answer: b Explanation: IPsec secures IP communications.
Explanation: RSA is a popular public-key encryption 19) What type of cryptography uses one-way encryption?
algorithm. a) Symmetric encryption
14) What does a firewall do? b) Asymmetric encryption
a) Encrypts data c) Hashing
b) Prevents unauthorized access to a network d) Digital signature
c) Monitors system performance Answer: c
d) Manages file storage Explanation: Hashing generates a fixed output that cannot be
Answer: b reversed.
20) Which of the following is NOT a cryptographic goal? 25) Which is NOT a feature of firewalls?
a) Scalability a) Packet filtering
b) Confidentiality b) Network monitoring
c) Integrity c) Traffic encryption
d) Authentication d) Intrusion prevention
Answer: a Answer: c
Explanation: Cryptography focuses on data security, not Explanation: Firewalls do not encrypt traffic.
scalability. 26) Which cryptographic principle ensures non-repudiation?
21) Which protocol helps secure wireless LANs? a) Confidentiality
a) SSL b) Integrity
b) WEP c) Authentication
c) TCP d) Digital signatures
d) HTTP Answer: d
Answer: b Explanation: Digital signatures prevent denial of actions.
Explanation: WEP secures wireless LAN communication. 27) Which of the following is NOT secured by SSL?
22) What is the role of a digital certificate? a) TCP connections
a) Encrypts data b) E-mail transmission
b) Verifies the authenticity of a user or device c) File encryption on hard drives
c) Filters spam emails d) Online payments
d) Improves bandwidth Answer: c
Answer: b Explanation: SSL secures data during transmission, not local
Explanation: Digital certificates authenticate identities. storage.
23) Which type of encryption uses a public and private key 28) What is a major weakness of WEP?
pair? a) Uses weak passwords
a) Symmetric encryption b) Vulnerable to brute force attacks
b) Asymmetric encryption c) Weak encryption algorithms
c) Hashing d) High resource consumption
d) Steganography Answer: c
Answer: b Explanation: WEP has vulnerabilities in its encryption design.
Explanation: Asymmetric encryption uses two separate keys. 29) What does RSA stand for?
24) What does a VPN primarily do? a) Random Secure Algorithm
a) Encrypts emails b) Rivest-Shamir-Adleman
b) Creates secure remote access c) Remote Security Application
c) Monitors network traffic d) Reliable System Authentication
d) Filters web content Answer: b
Answer: b Explanation: RSA is named after its inventors.
Explanation: VPNs enable secure communication over public 30) Which cryptographic algorithm is widely used for secure
networks. online payments?
a) RSA
b) DES Different Routing Algorithm
c) SHA-1
d) RC4 Feature Distance Vector Link State Path Vector
Answer: a Algorithm Bellman-ford Dijkstra Policy-based
Explanation: RSA ensures secure communication in online Information Neighbour-only Global Path and AS info
transactions. Sharing
Concergence Slower Faster Moderate
Different Port Used in Computer Network Speed
Use Case Small Network Large Network Inter-domain routing
1. Well-Known Ports (0-1023)

These ports are reserved for commonly used protocols and services:

• Port 20 & 21 (FTP): File Transfer Protocol for file transfers.


• Port 22 (SSH): Secure Shell for secure remote login.
• Port 23 (Telnet): Unsecured remote access.
• Port 25 (SMTP): Simple Mail Transfer Protocol for sending emails.
• Port 53 (DNS): Domain Name System for resolving domain names
to IP addresses.
• Port 80 (HTTP): Hypertext Transfer Protocol for web traffic.
• Port 443 (HTTPS): Secure HTTP for encrypted web traffic.

2. Registered Ports (1024-49151)

These ports are used by specific applications registered with the Internet
Assigned Numbers Authority (IANA):

• Port 1433 (SQL Server): Used by Microsoft SQL Server.


• Port 3306 (MySQL): Database service for MySQL.
• Port 8080 (HTTP Alternative): Used as an alternative to HTTP.

You might also like