Computer Networks

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

QUIZ

1. What is a computer network?


a) A device used to display information on a computer screen
b) A collection of interconnected computers and devices that can communicate and
share resources
c) A type of software used to create documents and presentations
d) The physical casing that protects a computer’s internal components

2. What is internet?
a) A network of interconnected local area networks
b) A collection of unrelated computers
c) Interconnection of wide area networks
d) A single network

3. Which of the following is an example of Bluetooth?


a) wide area network
b) virtual private network
c) local area network
d) personal area network

4. Which of the following computer networks is built on the top of another network?
a) overlay network
b) prime network
c) prior network
d) chief network

5. What is the full form of OSI?


a) optical service implementation
b) open service Internet
c) open system interconnection
d) operating system interface

6. When a collection of various computers appears as a single coherent system to its


clients, what is this called?
a) mail system
b) networking system
c) computer network
d) distributed system

7. How many layers are there in the ISO OSI reference model?
a) 7
b) 5
c) 4
d) 6

8. What are nodes in a computer network?


a) the computer that routes the data
b) the computer that terminates the data
c) the computer that originates the data
d) all of the mentioned

9. Which one of the following is not a function of network layer?


a) congestion control
b) error control
c) routing
d) inter-networking

10. How is a single channel shared by multiple signals in a computer network?


a) multiplexing
b) phase modulation
c) analog modulation
d) digital modulation

11. Which of the following devices forwards packets between networks by processing the
routing information included in the packet?
a) firewall
b) bridge
c) hub
d) router

12. What is the term for an endpoint of an inter-process communication flow across a
computer network?
a) port
b) machine
c) socket
d) pipe

13. How do two devices become part of a network?


a) PIDs of the processes running of different devices are same
b) a process in one device is able to exchange information with a process in another
device
c) a process is active and another is inactive
d) a process is running on both devices
14. Which layer does the data link layer take packets from and encapsulate them into
frames for transmission?
a) transport layer
b) application layer
c) network layer
d) physical layer

15. Which of this is not a network edge device?


a) Switch
b) PC
c) Smartphones
d) Servers

16. Which type of network shares the communication channel among all the machines?
a) anycast network
b) multicast network
c) unicast network
d) broadcast network

17. Which topology requires a multipoint connection?


a) Ring
b) Bus
c) Star
d) Mesh

18. Which of the following maintains the Domain Name System?


a) a single server
b) a single computer
c) distributed database system
d) none of the mentioned

19. When discussing IDS/IPS, what is a signature?


a) It refers to “normal,” baseline network behaviour
b) It is used to authorize the users on a network
c) An electronic signature used to authenticate the identity of a user on the network
d) Attack-definition file

20. Which of the following are Gigabit Ethernets?


a) 1000 BASE-LX
b) 1000 BASE-CX
c) 1000 BASE-SX
d) All of the mentioned
21. Which of the following networks extends a private network across public networks?
a) virtual private network
b) local area network
c) storage area network
d) enterprise private network

22. Which layer is responsible for process to process delivery in a general network
model?
a) session layer
b) data link layer
c) transport layer
d) network layer

23. What does each packet contain in a virtual circuit network?


a) only source address
b) only destination address
c) full source and destination address
d) a short VC number

24. What is the term for the data communication system within a building or campus?
a) MAN
b) LAN
c) PAN
d) WAN

25. What was the name of the first network?


a) ASAPNET
b) ARPANET
c) CNNET
d) NSFNET

26. Which of the following is the network layer protocol for the internet?
a) hypertext transfer protocol
b) file transfer protocol
c) ethernet
d) internet protocol

27. Which network topology requires a central controller or hub?


a) Ring
b) Bus
c) Star
d) Mesh

28. If a link transmits 4000 frames per second, and each slot has 8 bits, what is the
transmission rate of the circuit using Time Division Multiplexing (TDM)?
a) 500kbps
b) 32kbps
c) 32bps
d) 500bps

29. Which of the following allows LAN users to share computer programs and data?
a) File server
b) Network
c) Communication server
d) Print server

30. What type of transmission is involved in communication between a computer and a


keyboard?
a) Half-duplex
b) Full-duplex
c) Simplex
d) Automatic

31. Which layer provides the services to user?


a) physical layer
b) presentation layer
c) session layer
d) application layer

32. Which connection is necessary for a computer to join the internet?


a) internet society
b) internet service provider
c) different computer
d) internet architecture board

33. Which of the following allows you to connect and login to a remote computer?
a) SMTP
b) HTTP
c) FTP
d) Telnet

34. Which of the following is used in an attempt to render a computer resource


unavailable to its intended users?
a) botnet process
b) worms attack
c) virus attack
d) denial-of-service attack

35. Transport layer aggregates data from different applications into a single stream before
passing it to ____________
a) network layer
b) data link layer
c) application layer
d) physical layer

36. Which of the following are transport layer protocols used in networking?
a) TCP and FTP
b) UDP and HTTP
c) TCP and UDP
d) HTTP and FTP

37. User datagram protocol is called connectionless because _____________


a) all UDP packets are treated independently by transport layer
b) it sends data as a stream of related packets
c) it is received in the same order as sent order
d) it sends data very quickly

38. Transmission control protocol ___________


a) is a connection-oriented protocol
b) uses a three way handshake to establish a connection
c) receives data from application as a single stream
d) all of the mentioned

39. An endpoint of an inter-process communication flow across a computer network is


called __________
a) socket
b) pipe
c) port
d) machine

40. In IPv6 addresses, addresses that start with eight 0s are called ________
a) Unicast addresses
b) Multicast addresses
c) Any cast addresses
d) Reserved addresses

You might also like