0% found this document useful (0 votes)
15 views21 pages

Data Communication Questions

The document contains a series of data communication questions and answers covering various topics such as networking devices, protocols, and security measures. It includes questions about VPNs, firewalls, LANs, and communication methods, with correct answers provided for each question. The content is structured in a quiz format, aimed at testing knowledge in data communication principles.

Uploaded by

bacha meskerem
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views21 pages

Data Communication Questions

The document contains a series of data communication questions and answers covering various topics such as networking devices, protocols, and security measures. It includes questions about VPNs, firewalls, LANs, and communication methods, with correct answers provided for each question. The content is structured in a quiz format, aimed at testing knowledge in data communication principles.

Uploaded by

bacha meskerem
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 21

Data Communication Questions

Q:
Which of the following is used to connect one station with another?

(A) VPN

(B) VLAN

(C) RADIUS

(D) NAT

Hide Answer

Correct Answer : B

Q:
Which of the following device has File Sharing, and Network Connection the
same protection provided?

(A) Switch

(B) Server

(C) Workstation

(D) Both B and C

Hide Answer

Correct Answer : D

Q:
Which of the following is VPN Remote Computing Tunneling Protocol?

(A) L2F

(B) L2TP
(C) PPTP

(D) All of the above

Hide Answer

Correct Answer : D

Q:
Which command is used in Linux to change folder permission?

(A) CHMOD

(B) IS

(C) IS-I

(D) Top

Hide Answer

Correct Answer : A

Q:
Which hardening method is used by a computer for IP address and name?

(A) NTFS

(B) IFS

(C) PKI

(D) Access Control List

Hide Answer

Correct Answer : D

Q:
Which of the following is not a fibre cable limb property?

(A) sending data at a higher speed than copper cable

(B) capturing Waves Easily With Copper Cable

(C) density function

(D) send as single light

Hide Answer

Correct Answer : B

Q:
Which device is used to provide security to mobile storage?

(A) flash card

(B) smart card

(C) public key

(D) All of the above

Hide Answer

Correct Answer : B

Q:
When the user is banned from downloading software, then what is it called?

(A) desktop lockdown

(B) desktop lockup

(C) both a and b

(D) None of these


Hide Answer

Correct Answer : A

Q:
Which of the following are dependable tools?

(A) flash cards

(B) smart cards

(C) memory card

(D) masterCard

Show Answer
Q:
Which of the following is an example of a Tunneling Network?

(A) Private network data is encapsulated

(B) Private data is transmitted over public networks

(C) None of the above

(D) Both A and B

Hide Answer

Correct Answer : D
Q:
What are the advantages of using a firewall for LAN?

(A) Helps to access the message

(B) Controlling different resources in a disciplined manner

(C) Providing Security for the LAN

(D) Both b and c


Hide Answer

Correct Answer : D

Q:
Which media is used to provide protection to Radio Frequency?

(A) UTP

(B) STP

(C) Coax

(D) Fibers

Hide Answer

Correct Answer : D

Q:
On which OSI layer do Pocket Filtering Firewalls work?

(A) at the application layer

(B) at the transport layer

(C) at the network layer

(D) both b and c

Hide Answer

Correct Answer : D

Q:
Which of the following are stateful packets if a stateful firewall is to filter
connection-oriented packets?

(A) UDP

(B) ICP
(C) IP

(D) ICMP

Hide Answer

Correct Answer : B

Q:
Which of the following routers use packet filtering?

(A) Application layer firewall

(B) Packet filtering firewall

(C) Router enhance firewall

(D) IP Enabled Firewall

Hide Answer

Correct Answer : B

Q:
Who among the following can be seen as Security John?

(A) INRANET

(B) INTERNET

(C) DMZ

(D) None of these

Hide Answer

Correct Answer : D

Q:
Which device is used to connect the mobile to the network?
(A) PDR

(B) PDA

(C) PAGER

(D) Both B and C

Hide Answer

Correct Answer : D

Q:
Which of the following is the registered port as per IANA?

(A) Port 1 to 255

(B) Port 256 to 1024

(C) Port 1024 to 49151

(D) Port 1028 to 68536

Show Answer
Q:
Which is used to pass through the firewall?

(A) TCP

(B) IP

(C) IPX/SPX

(D) NET BEUI

Hide Answer

Correct Answer : C

Q:
Which protocol is used for E-Mail Traffic?
(A) ARP

(B) DMS

(C) SMTP

(D) IM

Hide Answer

Correct Answer : C

Q.131 Many low-speed channels are interwove into one high-speed transmission by…..

(A) time-division multiplexer

(B) frequency-division multiplexer

(C) both (A) and (B)

(D) none of these

Hide Answer

Ans . A

Q.132 A central computer surrounded by one or more satellite computers is


called.

(A) bus network

(B) ring network

(C) star network

(D) none of these

Hide Answer

Ans . C

Q.133 The most flexibility how devices are wired together is provided by…
(A) bust networks

(B) ring networks

(C) star networks

(D) T-switched networks

Show Answer
Q.134 A network that requires human intervention to route signals is called.

(A) bus network

(B) ring network

(C) star network

(D) T-switched network

Hide Answer

Ans . D

Q.135 A packet-switching network

(A) is free

(B) can reduce the cost of using an information utility

(C) allows communication channels to be shared among more than one user

(D) both (B) and (C)

Hide Answer

Ans . D

Q.136 Local area network can transmit….

(A) faster than telecommunications over public telephone lines.

(B) slower than telecommunications over public telephone lines.


(C) using twisted-pair wiring or coaxial cables

(D) both (A) and (C)

Hide Answer

Ans . D

Q.137 A local area network….

(A) that connects thirty personal computers can provide more computing power than a
minicomputer.

(B) cannot become bogged down like a mainframe if the load is too high..

(C) both (A) and (B)

(D) none of these.

Hide Answer

Ans . A

Q.138 The cheapest modems can transmit…..

(A) 300 bits per second

(B) 1200 bits per second

(C) 2400 bits per second

(D) none of these

Show Answer
Q.139 Terminal emulation allows….

(A) a dumb terminal to pretend that it is a personal computer.

(B) a personal computer to pretend that it is a computer terminal

(C) a dumb terminal to produce a local echo

(D) both (A) and (B)


Hide Answer

Ans . B

Q.140 Sending a file from personal computer’s primary memory or disks to


another computer is called..

(A) uploading

(B) downloading

(C) logging on

(D) none of these

Hide Answer

Ans . A
Q:
Which media is used for the installation of the local network?

(A) Fiber

(B) CAT3

(C) CAT5

(D) Thin Net

Hide Answer

Correct Answer : C

Q:
Which source and security are generally used for connecting pair-to-pair and
wiring for LAN devices?

(A) SQL Sever

(B) Routers
(C) Switches

(D) Workstations

Hide Answer

Correct Answer : D

Q:
When independent servers are placed in a group and the group acts as a single
server, it is called a?

(A) proxy servers

(B) SQL Server

(C) server array

(D) Server Cluster

Hide Answer

Correct Answer : D

Q:
According to IANA which of the following is known as a registered port?

(A) port 1 to 255

(B) Port 255 to 1024

(C) Port 1024 to 49151

(D) All of the above

Hide Answer

Correct Answer : C

Q:
किस सिक्युरिटी जॉन को प्राइवेट कंपनी चलाती हैं?
(A) FORWARD LOOKUP ZONE

(B) INTERNET LOOKUP ZONE

(C) INTRANET

(D) INTERNET

Hide Answer

Correct Answer : C

Q:
Which of the following statements are true for firewalls?

(A) filtering network traffic

(B) hardware and software security

(C) follow the rules

(D) all of the above

Hide Answer

Correct Answer : D

Q:
Which of the following statements will be true when static packet filtering is used
on a router?

(A) It provides job security

(B) These packet filtering proxy servers are secure

(C) It is more secure than dynamic

(D) Both b and c

Show Answer
Q:
For what work are firewalls designed?

(A) Security exposure is limited

(B) Logging in to Internet Activity

(C) Helping with the organization's security

(D) Protect against virus

Hide Answer

Correct Answer : D

Q:
Which of the following systems run at the application layer using proxy software?

(A) Proxy Nat

(B) Proxy Client

(C) Client 32

(D) Proxy Server

Hide Answer

Correct Answer : D

Q:
Which of the following firewalls keeps track of the connection state?

(A) application layer firewall

(B) router enhance firewall

(C) stateful packet filtering firewall

(D) packet filtering firewall

Hide Answer
Correct Answer : D

Q.1 What is the minimum number of wires needed to send data over it serial
communication link layer?

(A) 1

(B) 2

(C) 3

(D) 4

Hide Answer

Ans . B

You should also check Important Question of Indian Geography

Q.2 Which data communication method is used to send data over a serial
communication link?

(A) simplex

(B) half duplex

(C) full duplex

(D) all of these

Hide Answer

Ans . C

Q.3 Which of the following statements is incorrect?

(A) teleprocessing combing telecommunication and DP techniques in online activities.

(B) Multiplexers are designed to accept data from several I/O devices and transmit a
unified stream of data on one communication line.
(C) a half-duplex line is a communication line in which data can move in two directions,
but not the same time.

(D) batch processing is the preferred processing mode for telecommunication


operations.

Hide Answer

Ans . D

Q.4 The interactive transmission of data within a time sharing system may be
best suited to…..

(A) simplex line

(B) half duplex lines

(C) full duplex line

(D) bi-flex lines

Show Answer
Q.5 Teleprinters….

(A) are used for printing at remote locations, not for input.

(B) offer both high-speed operation and a variety of formatting controls.

(C) have a printer for output and a keyboard for input

(D) are same as teletypes.

Hide Answer

Ans . C

Q.6 Which of the following is an example of a bounded medium?

(A) coaxial cable

(B) wave guide

(C) fiber optic cable


(D) all of these

Hide Answer

Ans . D

Q.7 Coaxial cable has conductors with….

(A) a common axis

(B) equal resistance

(C) the same diameter

(D) none of these

Show Answer
Q.8 The area of coverage of a satellite radio beam is called its….

(A) beam width

(B) circular polarization

(C) footprint

(D) identity

Hide Answer

Ans . C

Q.9 The amount of uncertainty in a system of the symbol is called.

(A) bandwidth

(B) entropy

(C) loss

(D) quantum

Show Answer
Q.10 Buffering is….
(A) the process of temporarily storing the data to allow for small variation in device
speeds.

(B) a method to reduce cross-talks

(C) storage of data within the transmitting medium until the receiver is ready to receive

(D) a method to reduce the routing overhead

Hide Answer

Ans . A

Q.151 Computer connected with LAN......

(A) work fast

(B) go online

(C) can e-mail

(D) can share information or peripheral devices

(E) None of these

Hide Answer

Ans . D

Q.152 LAN is useful for.......

(A) railway

(B) bank

(C) businessman

(D) transport

(E) None of these

Hide Answer
Ans . C

Q.153 Telephone broadcast is an example of..........transmission.

(A) Simplex

(B) Half duplex

(C) Full duplex

(D) Automatic

(E) None of these

Hide Answer

Ans . B

Q.154 A parity bit is :

(A) used to indicate upper case letters

(B) the last bit in a byte

(C) the first bit in a byte

(D) use to detect errors

Hide Answer

Ans . C

Q.155 The first computer network of the world is.........

(A) I net

(B) NSF net

(C) Arpanet

(D) V net

(E) None of these


Hide Answer

Ans . C

Q.156 Which of the following techniques needs source device and destination
device in line of sight for data transfer?

(A) LAN

(B) Bluetooth

(C) WAN

(D) Infrared

(E) All

Hide Answer

Ans . D

Q.157 When more computers are connected at one place, it is called

(A) LAN

(B) WAN

(C) Infinite

(D) WON

(E) DON

Hide Answer

Ans . A

Q.158 Bank's ATM facility is an example of.........

(A) LAN

(B) WAN

(C) Mixed networking


(D) Multipurpose

(E) None of these

Hide Answer

Ans . B

Q.159 Which of the following is not of the same group?

(A) Internet

(B) Apple talk

(C) Bus

(D) Ring

(E) None of these

Hide Answer

Ans . B

Q.160 WAN is not useful for -

(A) Ministry of Foreign affair

(B) Foreign banks

(C) Municipality

(D) Airport

(E) None of these

Hide Answer

Ans . C

You might also like