Computer Networks Part-5
Computer Networks Part-5
(a) Topology
(b) Routing
(c) Networking
(d) Control
Q. The sharing of a medium and its link by two or more devices
is called _________
a) 10 Mbps
b) 100 Mbps
c) 1000 Mbps
d) 10000 Mbps
Q. The attacker using a network of compromised devices is
known as _____________
a) Internet
b) Botnet
c) Telnet
d) D-net
Q. Which of this is not a guided media?
a) IP
b) MAC
c) Port
d) None of the mentioned
Q. Electronic mail uses which Application layer protocol?
a) SMTP
b) HTTP
c) FTP
d) SIP
Q. The ____________ translates internet domain and host
names to IP address.
a) 22
b) 23
c) 21
d) 25
Q. Which of the following is false with respect to UDP?
a) Connection-oriented
b) Unreliable
c) Transport layer protocol
d) Low overhead
Q. Network layer firewall works as a __________
a) Frame filter
b) Packet filter
c) Content filter
d) Virus filter
Q. MAC address is of ___________
a) 24 bits
b) 36 bits
c) 42 bits
d) 48 bits
Q. Which connector does the STP cable use?
a) BNC
b) RJ-11
c) RJ-45
d) RJ-69
Q. The packet of information at the application layer is called
__________
a) Packet
b) Message
c) Segment
d) Frame
Get the PDF of this lecture
on telegram.
COMPUTER SYSTEMS AND ORGANISATION
https://emrs.tribal.gov.in/showfile.php?lang=1&level=1&ls_id=
156&lid=116
Target Abhi Mobile App
@teachersaddabytargetabhi