0% found this document useful (0 votes)
4 views8 pages

Important Guess of Computer Networks

The document contains a series of multiple-choice questions (MCQs) and short and long questions related to computer networks, covering topics such as networking devices, security threats, transmission methods, and subnetting. It emphasizes the importance of understanding various networking concepts and their applications. Additionally, it provides a guide for exam preparation, suggesting that the content is speculative and should be approached with caution.

Uploaded by

ma4309319
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views8 pages

Important Guess of Computer Networks

The document contains a series of multiple-choice questions (MCQs) and short and long questions related to computer networks, covering topics such as networking devices, security threats, transmission methods, and subnetting. It emphasizes the importance of understanding various networking concepts and their applications. Additionally, it provides a guide for exam preparation, suggesting that the content is speculative and should be approached with caution.

Uploaded by

ma4309319
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Important Guess of Computer Networks

Do it at your Own Risk it’s just a Guess


MCQS also follow some from book
1. Which networking device is responsible for forwarding data packets between different
networks based on IP addresses?
o A) Switch
o B) Hub

o C) Router
o D) Repeater
2. Which device operates at the Data Link Layer and reduces collision by segmenting
networks into smaller collision domains?
o A) Repeater

o B) Switch
o C) Router
o D) Modem
3. A hub operates at which layer of the OSI model?

o A) Physical Layer
o B) Data Link Layer
o C) Network Layer
o D) Transport Layer
4. Which of the following devices can be used to extend the range of a network by
amplifying signals?
o A) Router

o B) Repeater
o C) Bridge
o D) Firewall
5. Which device connects multiple networks together and determines the best path for
data transmission?
o A) Gateway
o B) Hub
o C) Switch
o D) Bridge
6. Which networking device is used to filter and forward packets based on MAC
addresses?
o A) Hub
o B) Repeater

o C) Switch
o D) Router
7. A firewall is mainly used for:
o A) Data transmission

o B) Network security
o C) Increasing bandwidth
o D) Connecting devices
8. Which device converts digital signals into analog and vice versa for communication
over telephone lines?
o A) Hub
o B) Router

o C) Modem
o D) Switch
9. What is the primary function of a bridge in networking?
o A) Connects different networks and determines the best route
o B) Amplifies signals over long distances

o C) Filters and forwards data between two network segments


o D) Protects networks from cyber threats
10. Which device can create Virtual Local Area Networks (VLANs)?
o A) Router
o B) Hub

o C) Managed Switch
o D) Modem
11. Which of the following is an example of an active attack on a network?
o A) Eavesdropping
o B) Traffic analysis

o C) Denial-of-Service (DoS)
o D) Passive monitoring
12. Which security threat involves intercepting and modifying data during transmission?

o A) Man-in-the-Middle (MITM) attack


o B) Phishing
o C) SQL Injection
o D) Ransomware
13. What is the primary purpose of an Intrusion Detection System (IDS)?
o A) Prevent cyberattacks

o B) Detect and alert about suspicious activity


o C) Encrypt network data
o D) Monitor system performance
14. Which of the following security mechanisms uses encryption to secure data
transmission?
o A) Firewall
o B) Antivirus

o C) VPN
o D) IDS
15. Which security threat tricks users into revealing sensitive information by pretending to
be a trustworthy entity?
o A) DDoS attack

o B) Phishing
o C) Ransomware
o D) SQL Injection
16. What is the main function of a firewall?
o A) Speed up internet connections

o B) Block unauthorized access


o C) Store website data
o D) Encrypt email communication
17. Which attack floods a network with traffic to make services unavailable?
o A) Phishing

o B) Denial-of-Service (DoS)
o C) Man-in-the-Middle
o D) Rootkit
18. Which security protocol is used to securely transfer data over the web?
o A) HTTP

o B) HTTPS
o C) FTP
o D) SMTP
19. A virus that spreads by attaching itself to a legitimate program is called:
o A) Trojan
o B) Worm
o C) Spyware

o D) File Infector Virus


20. Which of the following is an example of preventive security control?

o A) Firewalls
o B) IDS
o C) Logging
o D) Security audits
21. Which switching method establishes a dedicated path between sender and receiver?
o A) Packet Switching

o B) Circuit Switching
o C) Message Switching
o D) Hybrid Switching
22. In packet-switched networks, which type does NOT follow a predefined path?
o A) Virtual Circuit Network

o B) Datagram Network
o C) Circuit Switching
o D) Frame Relay
23. Which type of transmission sends multiple bits at the same time?
o A) Serial Transmission

o B) Parallel Transmission
o C) Synchronous Transmission
o D) Isochronous Transmission
24. Which of the following is NOT a type of Time Division Multiplexing (TDM)?
o A) Synchronous TDM
o B) Statistical TDM

o C) Asynchronous TDM
o D) Isochronous TDM
25. In subnetting, the broadcast address for a subnet is used for:
o A) Sending data to a specific host

o B) Sending data to all hosts in the subnet


o C) Routing data to the internet
o D) Assigning IP addresses
26. Which of the following subnet masks represents a /26 network?

o A) 255.255.255.192
o B) 255.255.255.128
o C) 255.255.255.224
o D) 255.255.255.240
27. Which network layer is responsible for logical addressing?
o A) Physical Layer
o B) Data Link Layer

o C) Network Layer
o D) Transport Layer
28. Which method is used in IPv6 to provide automatic address assignment without a
DHCP server?
o A) NAT

o B) SLAAC
o C) ARP
o D) RIP
29. Which transmission impairment occurs when a signal weakens as it travels?
o A) Distortion

o B) Attenuation
o C) Noise
o D) Jitter
30. Which of the following is an example of a frequency-based multiplexing technique?
o A) TDM
o B) WDM

o C) FDM
o D) CDMA
------------------------------------------------------------------------------------
Short Questions
1. What is switching in computer networks?
2. What are the three main methods of switching? (v.imp)
3. What are the three phases of circuit switching? (v.imp)
4. Why is packet switching more efficient than circuit switching?
5. What is a Virtual Circuit Identifier (VCI)?
6. What are the three phases of a virtual circuit network?
7. What are the types of packet-switched networks? (v.imp)
8. What are the types of transmission in data communication?
9. What is the difference between parallel and serial transmission? (v.imp)
10. What are the advantages and disadvantages of asynchronous transmission?
11. Why is synchronous transmission faster than asynchronous transmission? (v.imp)(also
do there advantages and disadvantages also must have a look on its third type
isosynchronous)
12. What is bandwidth Utilization? (v.imp)
13. What is Multiplexing and Demultiplexing? Compare it and also write its types? (v.imp)
14. What is the difference between IPv4 and IPv6? (v.imp)
15. Convert the following binary address to dotted-decimal notation:
11000000.10101000.00000001.00000001 (v.imp)
16. What is subnetting, and why is it used? And compare it with supernetting? (v.imp)
17. What is Classless Inter-Domain Routing (CIDR)? And also difference between them
(Classless & Class full) (v.imp)
18. What is the main issue with classful addressing?
19. What are the three properties of a sine wave? (v.imp) (also do other properties given in
the syllabus)
20. Define jitter and its impact on communication.
21. What is the relationship between frequency and period in data signals? (v.imp) (also
learn about wavelength)
22. What is the Signal-to-Noise Ratio (SNR) and why is it important?
23. What are the three main types of transmission impairment? (v.imp)
24. How does attenuation affect a signal, and how can it be reduced?
25. What are the different types of noise in data transmission?
For short maybe some tricky questions will come like how we can find host address, IP address,
how we can find Subnet Mask and range etc.……. (so must have a look on it also from slides)
------------------------------------------------------------------------------------------

Long Questions
1. Explain the different types of switching in computer networks. Discuss circuit switching,
packet switching, and message switching with examples.
2. What are the different types of transmission in data communication? Explain parallel
and serial transmission along with their advantages and disadvantages. include types of
serial transmission (Asynchronous, Synchronous, Isosynchronous) (v.imp)
3. What is subnetting? Explain its importance and compare it with supernetting. Provide an
example of subnetting in a Class C network (chances of class B & C) (v.imp)
4. What is transmission impairment? Explain its types (attenuation, distortion, and noise)
with examples. How can these impairments be reduced? (v.imp)
Must follow all the instructions
------------------------------------------------------------------------------------------------------------------

Best Of Luck

You might also like