0% found this document useful (0 votes)
242 views8 pages

H.N.S Networks Layers and Protocols Multiple Choice Questions

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
242 views8 pages

H.N.S Networks Layers and Protocols Multiple Choice Questions

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

1 This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses

on “Reference Models – 2”.

1. OSI stands for __________


a) open system interconnection
b) operating system interface
c) optical service implementation
d) open service Internet

2. The number of layers in ISO OSI reference model is __________


a) 4
b) 5
c) 6
d) 7

3 . TCP/IP model does not have ______ layer but OSI model have this layer.
a) session layer
b) transport layer
c) application layer
d) network layer

 Explanation: In OSI reference model, there are two layers which are not present in
TCP/IP model. They are Presentation and Session layer. The functions of
Presentation and Session layer in the OSI model are handled by the transport layer
itself in TCP/IP

4 Which layer is used to link the network support layers and user support layers?
a) session layer
b) data link layer
c) transport layer
d) network layer

5 Which address is used on the internet for employing the TCP/IP protocols?
a) physical address and logical address
b) port address
c) specific address
d) all of the mentioned Explanation: The physical, logical, port and specific addresses are
used in TCP/IP protocol. All the addressing schemes, that is physical (MAC) and logical
address, port address and specific address are employed in both TCP/IP model and OSI
model. In TCP/IP, the addresses are more focused on the internet implementation of these
addresses.
6. TCP/IP model was developed _____ the OSI model.
a) prior to
b) after
c) simultaneous to
d) with no link to

Explanation: Several TCP/IP prototypes were developed at multiple research centers


between 1978 and 1983, whereas OSI reference model was developed in the year 1984.
TCP/IP was developed with the intention to create a model for the Internet while OSI was
intended to be a general network model.

7. Which layer is responsible for process to process delivery in a general network model?
a) network layer
b) transport layer
c) session layer
d) data link layer

Explanation: The role of Transport layer (Layer 4) is to establish a logical end to end
connection between two systems in a network. The protocols used in Transport layer is
TCP and UDP. The transport layer is responsible for segmentation of the data. It uses ports
for the implementation of process-to-process delivery.

8. Which address is used to identify a process on a host by the transport layer?


a) physical address
b) logical address
c) port address
d) specific address

Explanation: A port number is a way to identify a specific process to which an Internet or


other network message is to be forwarded when it arrives at a server. Some examples of
port numbers are port 20 which is used for FTP data, port 22 which is used for SSH remote
login ,and port 23 which is used for TELNET.

9. Which layer provides the services to user?


a) application layer
b) session layer
c) presentation layer
d) physical layer

Explanation: In networking, a user mainly interacts with application layer to create and send
information to other computer or network. Application layer provides the interface between
applications and the network. It is the top-most layer in both the TCP/IP and the OSI model.
10. Transmission data rate is decided by ____________
a) network layer
b) physical layer
c) data link layer
d) transport layer

Explanation: Physical layer is a layer 1 device which deals with network cables or the
standards in use like connectors, pins, electric current used etc. Basically the transmission
speed is determined by the cables and connectors used. Hence it is physical layer that
determines the transmission speed in network. Some of the cables used for high speed
data transmission are optical fiber cables and twisted pair cables.

QUESTIONS ABOUT (OSI) open system interference PART 1


Networking Questions and Answers – TCP/IP and OSI
Reference Model – II

1. In terms of the size of the network the correct order (ascending) is –


a) PAN, MAN, LAN, WAN
b) LAN, MAN, WAN, PAN
c) PAN, LAN, MAN, WAN
d) LAN, PAN, MAN, WAN

Explanation: Personal Area Network, Local Area Network, Metropolitan Area Network,
Wide Area Network is the correct order in terms of size of the network from smallest to
largest.

2 Logical Addressing and Routing are functions of which layer?


a) Physical Layer
b) Transport Layer
c) Data Link Layer
d) Network Layer

Explanation: . Logical Addressing and Routing are functions of the Network Layer.

3. Flow Control and Error Control are functions of which layer?


a) Physical Layer
b) Application Layer
c) Data Link Layer
d) Network Layer

Explanation: Flow Control and Error Control are functions of the Data Link Layer.

4 Dialog Control and Synchronization are function of which layer?


a) Presentation Layer
b) Application Layer
c) Session Layer
d) Data Link Layer

Explanation: Dialog Control and Synchronization are function of the Session Layer.

5 .Encryption and Compression are functions of which OSI layer?


a) Presentation Layer
b) Application Layer
c) Session Layer
d) Data Link Layer
6. File, Transfer, Access and Management (FTAM) is a function of which layer ?
a) Presentation Layer
b) Application Layer
c) Session Layer
d) Data Link Layer

Explanation: FTAM is an Application Layer function.

7. HTTP stands for ________


a) Hash Text Transfer Protocol
b) Hyper Text Transfer Protocol
c) Hash Transfer Text Protocol
d) none of the mentioned

. SMTP stands for ________


a) Service Message Transmission Permission
b) Secure Message Transfer Protocol
c) Simple Mail Transfer Protocol
d) Simple Message Transfer Protocol

UDP stands for ________


a) User Datagram Protocol
b) Used Data Protocol
c) Unified Definition Protocol
d) Undefined Diagnostic Protoco

ICMP stands for ________


a) Internal Control Message Protocol
b) Internet Cipher Mail Protocol
c) Internal Cipher Mail Protocol
d) Internet Control Message Protocol

SONET stands for ________


a) Secure Offline Network
b) Synchronous Optical Network
c) Service Offline Network
d) Secure Optical Netwrok

DSL stands for ________


a) Data Storage Line
b) Digital Subscriber Line
c) Data Service Language
d) Data Secure Language
Which of the following does not lie in the Application Layer of the TCP/IP Model?
a) HTTP
b) SMTP
c) RTP
d) UDP

Explanation: UDP lies in the Transport layer.

Which one of these does not lie in the Link Layer of the TCP/IP Model?
a) DSL
b) IP
c) SONET
d) 802.11

Explanation: IP (Internet Protocol) is a member of the Internet layer.


1. ___________ ensures the integrity and security of data that are passing over a
network.
a) Firewall
b) Antivirus
c) Pentesting Tools
d) Network-security protocols
2. Which of the following is not a strong security protocol?
a) HTTPS
b) SSL
c) SMTP
d) SFTP
3 Which of the following is not a secured mail transferring methodology?
a) POP3
b) SSMTP
c) Mail using PGP
d) S/MIME
Explanation: POP (Post Office Protocol) is a simple protocol which fetches the
updated mail stored for you by the server. S/MIME (Secure/Multipurpose Internet
Mail Extensions), SSMTP (Secure-Simple Mail Transfer Protocol), and PGP (Pretty
Good Privacy) are examples of protocols and methods for secure mailing.

3. __________ is a set of conventions & rules set for communicating two or more
devices residing in the same network?
a) Security policies
b) Protocols
c) Wireless network
d) Network algorithms
4. 5. TSL (Transport Layer Security) is a cryptographic protocol used for securing
HTTP/HTTPS based connection.
a) True
b) False Explanation: TLS which has now become SSL (Secure Socket Layer)
is one of the popular cryptographic protocols developed to provide security to
computer network while communication
5. . 6. HTTPS is abbreviated as _________
a) Hypertexts Transfer Protocol Secured
b) Secured Hyper Text Transfer Protocol
c) Hyperlinked Text Transfer Protocol Secured
d) Hyper Text Transfer Protocol Secure
6 SSL primarily focuses on _______
a) integrity and authenticity
b) integrity and non-repudiation
c) authenticity and privacy
d) confidentiality and integrity

You might also like