Network Cards
Network Cards
Answer
(C) Peripheral Component Interconnect (PCI), Industry Standard Architecture(ISA)
2.A networking device that forwards data packets along networks and acts as a central point of network
is called
(A) Repeater
(B) Router
(C) Bridge
(D) Hub
Answer
(B) Router
Answer
(C) Physical layer
Answer
(B) Data link layer
Answer
(C) MAN
6.Which is the general network standard for the data link layer in the OSI Reference Model
(A) IEEE 802.1
(B) IEEE 802.2
(C) IEEE 802.3
(D) IEEE 802.4
Answer
(B) IEEE 802.2
Answer
(A) 802.11
8.____ refers to a family of IEEE standards dealing with local area network and metropolitan area
network.
(A) 802
(B) 800
(C) 801
(D) 803
Answer
(A) 802
Answer
(C) Network Layer
10.A communication network which is used by large organizations over regional, national or global area
is called ___
(A) LAN
(B) WAN
(C) MAN
(D) PAN
Answer
(B) WAN
Answer
(C) 255.255.0.0
Answer
(A) 127.0.0.1
3.A central computer surrounded by one or more satellite computers is called a
(A) Bus network
(B) Ring network
(C) Star network
(D) None of these
Answer
(C) Star network
4.A networking device that receives a signal on an electromagnetic or an optical transmission medium,
amplifies the signal,and then retransmits it along the medium is called
(A) Router
(B) Hub
(C) transmitter
(D) Repeater
Answer
(D) Repeater
Answer
(B) 255.0.0.0
Answer
(A) Unshielded Twisted Pair
Answer
(B) CCITT
Answer
(B) Star
9.Which OSI layer divides a file into segments that are an efficient size for routing
(A) Transport Layer
(B) Network Layer
(C) Data link Layer
(D) None
Answer
(A) Transport Layer
Answer
(B) Fiber Distributed Data Interface
Which protocol working at the Transport layer provides a connectionless service between hosts
(A) UDP
(B) ARP
(C) TCP/IP
(D) None
Answer
(A) UDP
Answer
(B) ICMP
Answer
(A) User Datagram Protocol
4.What protocol does PPP use to identify the Network Layer Protocol
(A) UDP
(B) ICMP
(C) NCP
(D) None
Answer
(C) NCP
Answer
(C) megabits per seconds
6.If you want to locate the hardware address of a local device, which protocol would you use
(A) UDP
(B) ARP
(C) NCP
(D) None
Answer
(B) ARP
7.…… is primarily used for mapping host names and email destinations to IP address
(A) TCP
(B) DNS
(C) NCP
(D) None
Answer
(B) DNS
8.Which of the following TCP/IP protocol is used for transferring electronic mail messages from one
machine to another
(A) TCP
(B) SMTP
(C) NCP
(D) None
Answer
(B) SMTP
9. _____ is the continuous ability to send and receive data between interconnected networks.
(A) FTP
(B) SMTP
(C) TNS
(D) Network Interoperability
Answer
(D) Network Interoperability
Answer
(D) 255.255.255.0
Answer
(B) Physical layer
Answer
(B) Spanning Tree Protocol
Answer
(B) request/response
4.Which layer of OSI determines the interface of the system with the user
(A) Session layer
(B) Application layer
(C) Network layer
(D) Datalink layer
Answer
(B) Application layer
Answer
(D) All of the above
6.At which layer TCP/IP defines two protocols: Transmission Control Protocol(TCP) and User Datagram
Protocol(UDP)
(A) Transport layer
(B) Application layer
(C) Network layer
(D) Datalink layer
Answer
(A) Transport layer
7.which of the following uses the greatest number of layers in the OSI model
(A) Bridge
(B) Repeater
(C) Router
(D) Gateway
Answer
(D) Gateway
Answer
(A) OSPF
Answer
(A) LCP
Answer
(D) All of the above
Answer
(B) Datalink
Answer
(D) Network
Answer
(B) Class B
Answer
(C) 3
5.A device which divides the incoming signal into low frequencies to send to voice devices, and high
frequencies for data to the computer.
(A) multicast router
(B) interface
(C) splitter
(D) None
Answer
(C) splitter
7.Which layer establishes, maintains & synchronizes the interaction between communicating devices
(A) Physical
(B) Datalink
(C) Application
(D) Session
Answer
(D) Session
Answer
(A) NAV
Answer
(B) CSMA/CA
Answer
(C) Polling
Peer-to-Peer (P2P) is a ……..communications model
(A)Centralized
(B)decentralized
(C)client/server
(D)None
Answer
(B)decentralized
Answer
(C) LAN
3.What is the name of network topology in which there are bidirectional links between each possible
node
(A) Star
(B) Mesh
(C) Ring
(D) None
Answer
(B) Mesh
Answer
(C) Ring
5.Which TCP/IP protocol is used for file transfer with minimal capability and minimal overhead
(A) SGMP
(B) TFTP
(C) SUMP
(D) None
Answer
(B) TFTP
Answer
(B) 128
Answer
(B) Multicast Communication
Answer
(D) 32
Answer
(C) 5
10.What are the three types of addresses in IPV6
(A) Class A, Class B, Class C
(B) Unicast, anycast, multicast
(C) Unicast, dualcast, multicast
(D) None
Answer
(B) Unicast, anycast, multicast
IEEE 802.3 standard used what method as the media access method
(A) CSMA/CD
(B) CSMA/CA
(C) CDMA
(D) FDMA
Answer
(A) CSMA/CD
Answer
(A) Wireless Equivalent Privacy
Answer
(D) All of the above
Answer
(C) Both (A) & (B)
6.What is the minimum & maximum frame length for 10 Mbps Ethernet
(A) 32 bytes, 64 bytes
(B) 64 bytes, 128 bytes
(C) 64 bytes, 1518 bytes
(D) 32 bytes, 1518 bytes
Answer
(C) 64 bytes, 1518 bytes
Answer
(A) Simple Network Management Protocol
8.Which of the following refers to a group of standards that are still being developed as a part of overall
IEEE 802.11 WLAN support
(A) 802.11i
(B) 802.11x
(C) Both (A) & (B)
(D) None of the above
Answer
(C) Both (A) & (B)
9.Which of the following is a security protocol designed to provide a wireless LAN with better security
and privacy
(A) WEP
(B) SNMP
(C) WAP
(D) LDAP
Answer
(C) WAP
Answer
(C) NAV
Answer
(B) bidirectional
Answer
(C) Either (A) or (B)
Answer
(B) Asymmetric Digital Subscriber Line
Answer
(D) Presentation
Answer
(C) process to process message delivery
Answer
(A) Open Systems Interconnection
7.In OSI model, as the data packet moves from the upper to the lower layers, headers are _______.
(A) added
(B) removed
(C) deleted
(D) edited
Answer
(A) added
Answer
(D) All of the above
Answer
(B) Cyclic Redundancy Code
Answer
(A) 16
An addressing method in which the IP address space is not divided into classes
(A) Classful addressing
(B) Classless addressing
(C) Classless IDR
(D) None of the above
Answer
(B) Classless addressing
2.The number of differences between the corresponding bits in a two data words is known as……
distance
(A) Hanning
(B) Hamming
(C) Huffman
(D) None of the above
Answer
(B) Hamming
Answer
(C) broadcast
4.The splitting of a message into multiple packets at transport layer is known as….
(A) Fragmentation
(B) Segmentation
(C) Synchronization
(D) None of the above
Answer
(B) Segmentation
Answer
(A) Reverse Address Resolution Protocol
7.In Wireless LAN’s, a time interval between two frames to control access to the channel is called…..
(A) Interframe space
(B) Interleaving
(C) Interior routing
(D) None of the above
Answer
(A) Interframe space
8.An array of switches that are used to reduce the number of cross points is called…..
(A) singlestage switch
(B) dualstage switch
(C) multistage switch
(D) None of the above
Answer
(C) multistage switch
9.An application protocol of TCP/IP that allows remote login is known as…….
(A) NCP
(B) NVT
(C) NAV
(D) None of the above
Answer
(B) NVT
Answer
(A) Trivial File Transfer Protocol
Answer
(A) BSS
Answer
(B) BOOTP
Answer
(C) Classless Inter Domain Routing
4.In PPP, a three-way handshaking protocol used for authentication is known as……
(A) CHAP
(B) BOOTP
(C) FTP
(D) None of the above
Answer
(A) CHAP
Answer
(B) dynamic mapping
Answer
(B) Domain Name System
7.A protocol in which the sender sends one frame and stops until it receives confirmation from the
receiver
(A) Stop and Wait ARQ
(B) Store and forward switch
(C) Stop and Wait Protocol
(D) None of the above
Answer
(C) Stop and Wait Protocol
Answer
(B) HTTP
9.You are in the process of analyzing a problem that requires you to collect and store TCP/IP
Packets.Which of the following utilities is best suited for this purpose
(A) Performance Monitor
(B) Network Monitor
(C) NETSTAT
(D) NBTSTAT
Answer
(B) Network Monitor
10.Which of the following protocol provides confidentiality and authentication for an e-mail
(A) BGP
(B) BOOTP
(C) PGP
(D) None of the above
Answer
(C) PGP
DNS
1)The entire host name has a maximum of 255 characters.
3)Servers handle requests for other domains by contacting remote DNS server.
5) If a server has no clue about where to find the address for a hostname then server asks to the root
server.
6) Dynamic DNS allows client to update their DNS entry as their IP address change.
8)The right to use a domain name is delegated by domain name registers which are accredited by
internet corporation for assigned names and numbers.
Telnet
6) In character mode operation of telnet implementation each character typed is sent by the client to
the server.
7)In telnet, the client echoes the character on the screen but does not send it until a whole line is
completed in default mode.
9)If we want that a character be interpreted by the client instead of server escape character has to be
used.
11)In “character at a time” mode -Most text typed is immediately sent to the remote host for
processing.
1)A piece of icon or image on a web page associated with another webpage is called hyperlink.
4)Common gateway interface is used to generate executable files from web content by web server.
6)A web cookie is a small piece of data sent from a website and stored in user’s web browser while a
user is browsing a website.
8)Document object model (DOM) :-convention for representing and interacting with objects in html
documents.
1)Multiple object can be sent over a TCP connection between client and server in persistent HTTP.
4)HTTP client requests by establishing a transmission control protocol connection to a particular port on
the server.
5)In HTTP pipelining multiple HTTP requests are sent on a single TCP connection without waiting for the
corresponding responses.
8)In passive mode FTP, the client initiates both the control and data connections.
Security
Internet
2)To join the internet, the computer has to be connected to a internet service provider.
3)Internet access by transmitting digital data over the wires of a local telephone network is provided by
digital subscriber line.
4)ISP exchanges internet traffic between their networks by internet exchange point.
Cryptography
1)Cryptography is a method of storing and transmitting data in a particular form so that only those for
whom it is intended can read and process it.
5)In cryptography, the order of the letters in a message is rearranged by transpositional ciphers.
8) Transport layer security (TSL) is a cryptographic protocol used to secure HTTP connection.
12)Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption
Public Key Cryptography (PKC): Uses one key for encryption and another for decryption
Hash Functions: Uses a mathematical transformation to irreversibly “encrypt” information
13)There are of course a wide range of cryptographic algorithms in use. The following are amongst the
most well known:
DES
This is the ‘Data Encryption Standard’. This is a cipher that operates on 64-bit blocks of data, using a 56-
bit key. It is a ‘private key’ system.
RSA
RSA is a public-key system designed by Rivest, Shamir, and Adleman.
HASH
A ‘hash algorithm’ is used for computing a condensed representation of a fixed length message/file.
This is sometimes known as a ‘message digest’, or a ‘fingerprint’..
MD5
MD5 is a 128 bit message digest function. It was developed by Ron Rivest.
AES
This is the Advanced Encryption Standard (using the Rijndael block cipher) approved by NIST.
SHA-1
SHA-1 is a hashing algorithm similar in structure to MD5, but producing a digest of 160 bits (20
bytes).Because of the large digest size, it is less likely that two different messages will have the same
SHA-1 message digest. For this reason SHA-1 is recommended in preference to MD5.
HMAC
HMAC is a hashing method that uses a key in conjunction with an algorithm such as MD5 or SHA-1. Thus
one can refer to HMAC-MD5 and HMAC-SHA1.
4)Network layer firewall has two sub-categories as stateful firewall and stateless firewall.
6)An attempt to make a computer resource unavailable to its intended users is called denial-of-service
attack.
10) When a DNS server accepts and uses incorrect information from a host that has no authority giving
that information, then it is called DNS spoofing