The document contains a set of multiple choice questions related to networking, cybersecurity, banking, and finance. The questions cover topics such as hacking, credit/debit cards, risk management, firewalls, outsourcing, laws, document standards, development institutions, internet architecture, protocols, error detection, network models, and more. There are two sets of questions with varying levels of difficulty.
The document contains a set of multiple choice questions related to networking, cybersecurity, banking, and finance. The questions cover topics such as hacking, credit/debit cards, risk management, firewalls, outsourcing, laws, document standards, development institutions, internet architecture, protocols, error detection, network models, and more. There are two sets of questions with varying levels of difficulty.
The document contains a set of multiple choice questions related to networking, cybersecurity, banking, and finance. The questions cover topics such as hacking, credit/debit cards, risk management, firewalls, outsourcing, laws, document standards, development institutions, internet architecture, protocols, error detection, network models, and more. There are two sets of questions with varying levels of difficulty.
The document contains a set of multiple choice questions related to networking, cybersecurity, banking, and finance. The questions cover topics such as hacking, credit/debit cards, risk management, firewalls, outsourcing, laws, document standards, development institutions, internet architecture, protocols, error detection, network models, and more. There are two sets of questions with varying levels of difficulty.
Q. The card by which you cannot buy a product is: (a) Credit card (b) ATM card (c) Debit card (d) Smart card
Q. Loss of trust due to unauthorized activity on customer account is concerned with: (a) Reputational risk (b) Liquidity risk (c) Market risk (d) None of the above
Q. Which one of the following is a safety measure in banking network? (a) Router (b) Firewall (c) Modem (d) None of the above
Q. TSP helps financial institution of: (a) Manage cost (b) Improve service quality (c) Obtain necessary expertise (d) All of the above
Q. Legal risk arises because of: (a) Violation of laws (b) Non-confirmation with law (c) Legal rights non established (d) All of the above
Q. Which is the current revision & year of UCPDC? (a) UCPDC 500, 1993 (b) UCODC 400, 1993 (c) UCPDC 300, 1973 (d) All of the above
Q. development financial institution in India that has got merged with a bank is (a) IDBI (b) ICICI (c) IDFC (d) UTI
Q. A.....................is a connecting device that operates in the physical and data link layers of the internet model: (a) Repeater (b) Dual (c) Router (d) None of the above
Q. A.....................is data communication system spanning states, countries, or whole world: (a) MAN (b) LAN (c) WAN (d) None of the above
Q. A....................is a data communication system within a building plant or compus or between nearby buildings: (a) MAN (b) LAN (c) WAN (d) None of the above
Q. ...................reverse to the physical or logical arrangement of a network: (a) Data Flow (b) Mode of operation (c) Topology (d) None of the above
Q. The TCP/IP ..................layer is equivalent to the combined session, presentation and application layers of the OSI model; (a) application (b) network (c) data link (d) physical
Q. A .............bridge can forward filter frames and automatically build its forwarding table: (a) Simple (b) Dual (c) Transport (d) None of the above
Q. A.....................is a connecting device that operates in the physical and data link layers of the internet model: (a) Repeater (b) Dual (c) Router (d) None of the above
Q. A..........................regenerates a signal, connects segments of a LAN and has no filtering capability: (a) repeater (b) bridge (c) router (d) none of the above
Q. The IEEE 802.3 standard defines....................CSMA/CD as the access methods for first generation 10-Mbps fthernet. (a) 1-Persistent (b) p-persistent (c) none-persistent (d) none of the above
Q. ..................is the most widely used local area network protocol: (a) Token ring (b) Token Bus (c) Ethernet (d) None of the above
Q. In cyclic redundancy checking what is the CRC? (a) The divisor (b) The quotient (c) The dividend (d) The reminder
Q. Which error detection method consists of just one redundant bit per data unit (a) Simple parity check (b) Two dimensional parity check (c) CRC (d) Checksum
Q. A..............is a set of rules that governs data communication: (a) forum (b) protocol (c) standard (d) none of the abvoe
Q. ............................is a collector of many separate networks: (a) A WAN (b) An internet (c) A LAN (d) None of the above
Q. A.....................is data communication system spanning states, countries, or whole world: (a) MAN (b) LAN (c) WAN (d) None of the above
Q. A....................is a data communication system within a building plant or compus or between nearby buildings: (a) MAN (b) LAN (c) WAN (d) None of the above
Q. ...................reverse to the physical or logical arrangement of a network: (a) Data Flow (b) Mode of operation (c) Topology (d) None of the above
Q. This was the first network: (a) CSNET (b) NSENET (c) ANSNET (d) ARPANET
Q. A television broadcast is an example of......................transmission: (a) simplex (b) half duplex (c) full duplex (d) automatic
Q. Which topology required a central controller or hub? (a) Mesh (b) Star (c) Bus (d) All of the above
Q. The...........address uniquely defines a host on the internet. (a) physical (b) IP (c) port (d) specific
Q. The TCP/IP ..................layer is equivalent to the combined session, presentation and application layers of the OSI model; (a) application (b) network (c) data link (d) physical
Q. Ethernet uses a ................physical address that is imprinted on the network interface card (NIC ) (a) 32-bit (b) 64-bit (c) 6-bit (d) none of the above
Q. The................address also known as the link address, is the address of a node as defined by its LAN or WAN. (a) port (b) physical (c) logical (d) None of the above
Q. ..................providers full transport services to application. (a) TCP (b) UDP (c) ARP (d) None of the above
Q. .........................is a process to process protocol and adds only port addressed, checksum error control and length information to the data from the upper layer. (a) TCP (b) UDP (c) IP (d) None of the above
Q. The..................sub layer is responsible for the operation of the CSMA/CD access methods and framing. (a) LLC (b) MII (c) MAC (d) None of the above
Q. ICMPV6 includes.............................. (a) IGMP (b) ARP (c) RARP (d) Both a and c
Q. To deliver a message to the correct application program running on a host, the ..........address must be consulted. (a) port (b) IP (c) Physical (d) None of the above
Q. When a host on network A sends a message to a host on network B, which address does the router look at : (a) Port (b) Logical (c) Physical (d) None of the above
Q. In the OSI model, encryption and decryption are functions of the ................layer: (a) transport (b) session (c) presentation (d) application
Q. In the OSI model, what is the main function of the transport layers? (a) Node to node delivery (b) Process to process message delivery (c) synchronization (d) updating and maintenance of routing tables
Q. In the OSI model when data is transmitted from device A to device B, the header from A's layer 5 is read by B's .........layer. (a) physical (b) transport (c) session (d) resonating
Q. The OSI model consists of ..............layers. (a) three (b) five (c) seven (d) eight
Q.The physical layer is concerned with the movement of .....................over the physical medium. (a) programs (b) dialogs (c) protocols (d) bits
Q. Why was OSI model developed? (a) Manufactures disliked theTCP/IP protocol suite (b) The rate of data transfer was increasing exponentially (c) Standards were needed to allow any two system to communicate (d) None of the above
Q. Which of the following is an application layer service? (a) Remote log in (b) File transfer and access (c) Mail service (d) All of the above
Q. The..........layer lies between the network layer and the application layer. (a) Physical (b) Data link (c) Transport (d) None of the above
Q. As the data packet moves from the upper to the lower layers, headers are ............... (a) Added (b) Removed (c) Rearranged (d) Modified
Q. Mail services are available to network users through the.............layer (a) Data link (b) Physical (c) Transport (d) Application
Q. The.......................layer is the layer closest to the transmission medium. (a) Physical (b) Data link (c) Network (d) Transport
Q. The process to process delivery of the entire message is the responsibility of the.......layer. (a) Network (b) Transport (c) Application (d) Physical
Q. The.........layer of Ethernet consists of the LIC sub layer and the MAC sublayer. (a) Data link (b) Physical (c) Network (d) None of the above
Set-2 Q. A socket may have..................connections. (a) Many (b) One (c) Two (d) Zero
Q. TCP uses..................flow control mechanism (a) Stop and go (b) Sliding window (c) Wait for ask (d) Dynamic
Q. Which of the following is an application layer service? (a) Remote log in (b) FTAM (c) Mail Services (d) All of the above
Q. Modulation is a process to convert ..............signals into...................signals (a) Analog, Analog (b) Digital, Digital (c) Analog, Digital (d) Digital, Analog
Q. Bandwidth is measures in......................... (a) Kilobytes per second (b) Megabytes per second (c) Bits per second (d) Bytes per second
Q. Which of the following is not used to create web pages? (a) HTML (b) XML (c) SGML (d) DOS
Q. ....................does support fragmentation routers (a) IPv4 (b) IPv6 (c) Both (a) and (b) (d) None of the above
Q. .........................is does support fragmentation at routers. (a) FTP (b) HTTP (c) TELNET (d) ATM
Q. An IP address consists of...............bits (a) 4 (b) 8 (c) 16 (d) 32
Q. What is IP stands for: (a) Internet programming (b) Internet programming (c) Internet protocol (d) Internet protocol Q. IPv 6 has................bit address. (a) 32 (b) 64 (c) 128 (d) 256
Q. The OSI model consist of ...............layers. (a) Three (b) Five (c) Seven (d) Nine
Q. Encryption and decryption are the function of the.............layer. (a) Transport (b) Session (c) Presentation (d) Application
Q. .......................is an unreliable and connectionless protocol. (a) TCP (b) SMTP (c) UDP (d) FTP
Q. UDP and TCP are both...........protocol. (a) Application (b) Presentation (c) Session (d) Transport
Q. Data link layer has.................and.....................two sub layer. (a) LLC, MAC (b) LCP, MAC (c) LLC, IP (d) LLC, PI
Q. .........................is a situation when number a packet flowing is more than media bandwidth. (a) Collision (b) Congestion (c) Collision avoidance (d) Communication
Q. PPP is a ............layer protocol. (a) Data link (b) Session (c) Physical (d) Network
Q. UDP is an acronym for: (a) User delivery Protocol (b) User datagram Procedure (c) User Datagram Protocol (d) Unreliable Data gram protocol
Q. In cyclic redundancy checking, what is CRC? (a) Dividend (b) Divisor (c) Quotient (d) Remainder
Q. IEEE 802.4 standard is for: (a) Ethernet (b) Token bus (c) Token (d) Logical link control
Q. Which of the following types of signal requires the highest bandwidth for transmission? (a) Speech (b) Video (c) Music (d) Facsimile
Q. Packet generation in ALOHA network follows: (a) Poisson Distribution (b) Gaussian Distribution (c) Normal Distribution (d) None of the above
Q. Satellite to ground communication takes place through: (a) Reverse domain (b) Generic domain (c) Country domain (d) Either (b) or (c)
Q. To find the IP address of a host when the domain name is known, the..........can be used. (a) Reverse domain (b) Generic domain (c) Country domain (d) Either (b) or (c)
Q. Which of the following frame types is specified in the 802.5 standard? (a) Token (b) Abort (c) Data/command (d) All of the above
Q. DNS has: (a) Flat Name Space Structure (b) Networking Structure (c) Hierarchical Structure (d) Final Name Structure
Q. The default subnet mask for a class 'B' network is: (a) 255.0.0.0 (b) 255.255.0. (c) 255.255. 255.0 (d) 255.255.255.255
Q. Repeater is used to...........................the network segment length. (a) Switch (b) Limit (c) Extend (d) Regenerate
Q. The length of MAC address is................bits. (a) 8 (b) 16 (c) 48 (d) 64
Q. In an IP address every segment can have integer value between............and................ (a) 0,254 (b) 0,255 (c) 0,256 (d) 256,0
Q. Wireless communication uses.................technology (a) TCP/IP (b) CSMA/CD (c) CSMA/CA (d) None of the above
Q. Non-adaptive routing is also known as..................routing. (a) Static (b) Dynamic (c) Both (a) and (b) (d) None of the above
Q. The....................layer changes bits into electromagnetic signals. (a) Data link (b) Physical (c) Transport (d) Session
Q. The................layer lies between the transport and application layers. (a) Session (b) Physical (c) Network (d) Data link
Q. 10 base 2 is notation of ......................network. (a) Star topology (b) Token ring (c) Bus using thick cable (d) Bus using thin coaxial cable
Q. ....................is known as loss of energy (signals) over distance (a) Distortion (b) Noise (c) Attenuation (d) Crosstalk
Q. Protocol is a set of.............and.................that governs data communication. (a) Rules, model (b) Rules, common protocol (c) Rules, common language (d) Rules, common model
Set-c Q. Why was the OSI model developed: (a) Manufacturers disliked the TCP/IP protocol suit (b) The rate or data transfer was increasing exponentially (c) Standards were needed to allow any two systems to communicate (d) None of the above
Q. The OSI model consists of ......................layers: (a) Three (b) Five (c) Seven (d) Eight
Q. Identify the class of the following IP address : 4,5,6,7 : (a) Class A (b) Class B (c) Class C (d) Class D
Q. FTP is a protocol of ....................layer of TCP/IP protocol suit: (a) Application (b) Transport (c) Network (d) Physical and data link layer
Q. The...............layer changes bits into electromagnet signals: (a) Physical (b) Data link (c) Network (d) Transport
Q. A device has to IP address, this device could be.................. (a) A computer (b) A router (c) A gateway (d) Any of the above
Q. Repeaters function in the.............layer. (a) Physical (b) Data link (c) Network (d) Both (a) and (b)
Q. Which is the maximum size of the data portion of the IP datagram: (a) 65,535 bytes (b) 65,516 bytes (c) 65,475, bytes (d) 65,460 bytes
Q. Which of the following function does UDP perform? (a) Process to process communication (b) Host of host communication (c) End to end reliable data delivery (d) All of the above
Q. Which of the following types of signal requires the highest bandwidth for transmission. (a) Speech (b) Video (c) Music (d) Facsimile
Q. .....................is the most widely used local area network protocol. (a) Token ring (b) ATM (c) Token bus (d) Ethernet
Q. Switches work at .............layer. (a) Application (b) Data link (c) Physical (d) Network
Q. ......................is the superior network of token passing ring network than traditional ring network: (a) Ethernet star (b) Coaxial network (c) FDDI (d) LAN
Q. CSMA/CD stands for: (a) Carrier Sense Mode Access with Collision Derivation (b) Carrier Sense Multiple Application with Collision Detection (c) Carrier Sense Multiple Access with Collision Detection (d) Carrier Sense Many Access with Collision Detection
Q. An IP address consists to.............bits: (a) 4 (b) 8 (c) 16 (d) 32
Q. ......................is an unreliable and connector protocol: (a) TCP (b) UDP (c) SMTP (d) FTP
Q. In half-duplex transmission (a) Data can be transmitted in one direction always (b) Data can be transmitted in both directions simultaneously (c) Data can be half transmitted (d) Data can be transmitted in one direction at a time
Q. Non- adaptive routing is also known as ...............routing. (a) Static (b) Dynamic (c) Both (a) and (b) (d) None of the above
Q. A television broadcast is an example of................transmission (a) Simplex (b) Half-duplex (c) Full- duplex (d) Half-simplex
Q. DNS has: (a) Flat namespace structure (b) Networking structure (c) Hierarchical distributed database (d) Entity relationship database model
Q. Common methods used to calculate the shortest path between two routers. (a) Distance vector routing (b) Link state routing (c) Both (a) or (b) (d) Either (a) or (b)
Q. Bandwidth is measures in..................... (a) Kilobytes per second (b) Megabytes per second (c) Bits per second (d) Bytes per second
Q. Directory services is one of the services provided at the..............layer. (a) Application (b) Presentation (c) Session (d) Transport
Q. FDDI is an acronym of : (a) Fast data delivery interface (b) Fiber distributed data interface (c) Fiber distributed digital interface (d) Fast distributed data interface
Q. The data unit in the transport layer of TCP/IP suite is called: (a) Datagram (b) Segment (c) Message (d) Frame
Q. In the IP header, the field TTL (8 bits) tells: (a) Transistor-Transistor logic (b) The length of time that the datagram can exist on the internet (c) Total length of the datagram (d) None of the above
Q. Most commonly used protocol in DLC (Data Link Control) procedure is: (a) Sliding window protocol (in general) (b) Stop and wait sliding window protocol (c) Sliding window protocol with go back N (d) Sliding window with selective repeat
Q. Which of the following is not a valid generic domain name: (a) .edu (b) .mil (c) .int (d) .usa
Q. Which of the following frame types is specified in the 802.5 standard; (a) Token (b) Abort (c) Data/command (d) All of the above
Q. UDP and TCF are both...............layer protocols. (a) Application (b) Session (c) Transport (d) Presentation
Q. Bridge function in the ..............layer. (a) Physical (b) Data link (c) Network (d) Both (a) and (b)
Q. What is the main function of the transport layer? (a) Node to node delivery (b) End to end delivery (c) Synchronization (d) Updating and maintenance of routing tables
Q. The IP header size................. (a) Is 20 to 60 bytes long (b) Is 60 bytes long (c) Is 120 to 160 bytes long (d) Depends on the MTU
Q. Routers have................and.................functions. (a) Selection of best path, broadcasting (b) Selection of random path, switching (c) Selection of best path, pumping (d) Selection of best path, switching
Q. Encryption and decryption are functions of the..........layer. (a) Transport (b) Session (c) Presentation (d) Application
Q. What is IP stands for: (a) Internet programming (b) Internet programming (c) Internetworking protocol (d) Internet protocol
Q. Which of the following is an application layer services: (a) Mail Service (b) Remote log-in (c) FTAM (d) All of the these
Set-4 Q. The default subnet mask for a class 'B' network is: (a) 255.0.0.0 (b) 255.255.0. (c) 255.255. 255.0 (d) 255.255.255.255
Q. Routers have................and.................functions. (a) Selection of best path, broadcasting (b) Selection of random path, switching (c) Selection of best path, pumping (d) Selection of best path, switching
Q. None adaptice routing is also knwon as................routing: (a) Static (b) Dynamic (c) Both (a) and (b) (d) None of the above
Q. Wireless communication uses...............technology: (a) CSMA/CP (b) CSMA/CA (c) TCP/IP (d) None of the above
Q. In an IP address every segment can have integer value between........and.............. (a) 0,255 (b) 1, 256 (c) 0, 256 (d) 1,255
Q. Session initiation, management and termination are main services provided at.............leyer: (a) Application (b) Presentation (c) Session (d) None of the above
Q. ..................is the main protocol used to access information over world wide web (WWW): (a) TFTP (b) FTP (c) TELNET (d) HTTP
Q. Data link layer has................and...............two sub layers: (a) LLC, MAC (b) LCP, MAC (c) LLC, IP (d) None of the above Q. .......................are the situations when number of packets flowing is more than media bandwidth: (a) Collision (b) Congestion (c) Collision Avoidance (d) None of the above
Q. ......................is an unreliable and connectionless protocol: (a) TCP (b) SMTP (c) UDP (d) FTP
Q. UDP and TCP are both.............layer protocols: (a) Application (b) Presentation (c) Session (d) Transport
Q. Length of MAC address is ..................bits: (a) 8 (b) 16 (c) 48 (d) 64
Q. Length of MAC address is ...............bits: (a) 4 (b) 8 (c) 10 (d) 32
Q. Hub functions at................layer: (a) Physical (b) Application (c) Data link (d) Network
Q. Switches work at ......................layer: (a) Application (b) Data link (c) Physical (d) Network
Q. In half-duplex transmission: (a) Data can be transmitted in one direction always (b) Data can be transmitted in both directions simultaneously (c) Data can be half transmitted (d) Data can be transmitted in one direction at a time
Q. Repeater is used to...................the network segment length: (a) Switch (b) Limit (c) Extend (d) Regenerate
Q. .....................is the most widely used local area network protocol: (a) Token ring (b) ATM (c) Token bus (d) Ethernet
Q. Full form of IEEE is: (a) Institute of electrical and electromagnetic engineer (b) Institute of electrical and electronic engineer (c) Institute of elite electronics engineer (d) None of the above
Q. CSMA/CD stands for................. (a) Carrier sense mode access with collision derivation (b) Carrier sense multiple application with collision detection (c) Carrier sense multiple access with collision detection (d) Carrier sense many access with collision detection
Q. Medium access method can be categorized as..................and..................... (a) Random controlled or channelized (b) Static, random or channelized (c) ALOHA, CSMA/CD (d) ALOHA, CSMA/CS
Q. The ....................layer lies between the transport and application layers: (a) Data link (b) Physical (c) Network (d) Session
Q. Which of the following is an application layer services? (a) Remote log in (b) FTAM (c) Mail Service (d) All of the above
Q. The..............layer changes bits into electromagnet signals: (a) Physical (b) Network (c) Transport (d) Data link
Q. TCP uses......................flow control mechanism: (a) Stop and go (b) Sliding window (c) Wait for ack (d) Dynamic
Q. A socket can have...................connections Data warehousing (a) Many (b) One (c) Two (d) Zero
Q. .......................does support fragmentation at routers. (a) IPv4 (b) IPv6 (c) Both IPv4 and IPv6 (d) IPng
Q. IP datagram has................bytes of checksum field (a) 1 (b) 2 (c) 4 (d) 16
Q. In....................address resolution technique, message are used to determine the hardware address: (a) Table lookup (b) Dynamic (c) Closed form computation (d) None of the above
Q. The number of bits in the suffix of class C address is................... (a) 8 (b) 16 (c) 24 (d) 32
Q. Directory services is one of the services provided at the ...............layer. (a) Application (b) Presentation (c) Session (d) Transport
Q. Modulation is a process (technique) to convert.....................signal into ...................signals: (a) Analog, Analog (b) Digital, Digital (c) Analog, Digital (d) Digital, Analog
Q. Bandwidth is measured in.......................... (a) Kilobyte per second (b) Megabytes per second (c) Bits per second (d) Byte per second
Q. ...........................is known as loss of energy (signal) over distance : (a) Distortion (b) Noise (c) Attenuation (d) Crosstalk
Q.A television broadcast is an example of ........................transmission: (a) Simplex (b) Half duplex (c) Full Duplex (d) Half simplex
Q. Which of the following is not used to create web pages? (a) HTML (b) XML (c) SGML (d) None of the above
Q. Which of the following is a 'B' class network address? (a) 125.0.0.0 (b) 126.254.0.0 (c) 130.224.1.0 (d) None of the above
Q. IEEE 802.4 standard is for: (a) Ethernet (b) Token bus (c) Token ring (d) Link control
Q. Protocol is a set of ................and...................that governs data communication: (a) Rules, Model (b) Rules, common protocol (c) Rules, common language (d) Rules, common model