Computer Network
Computer Network
SUCCESS
COMPUTER NETWORK
BOOST YOUR KNOWLEDGE
5 + S
4 O N
S
59 STI ER
E W
QU NS
A
USEFUL FOR
4STUDENTS 4
□ □TEACHERS 4
□PARENTS 4□KIDS 4
□QUIZ TEST
□EXAM 4
4 □TRIVIA TEST 4
□COMPETITIVE EXAM 4
□OTHERS
2
Preface:
This book has undergone rigorous scrutiny to ensure its accuracy. I eagerly invite constructive
feedback on its content. Feel free to reach out to me via Facebook at https://www.facebook.
com/narayanchangder. Additionally, you can access all of my books on Google Play Books at
https://play.google.com/store/books/author?id=Narayan+Changder.
NARAYAN CHANGDER
This E-book is dedicated to the loving memory of my mother:
NARAYAN CHANGDER
may have found their way into this PDF
booklet.
Due care has been taken to ensure that
the information provided in this book
is correct. Author is not responsible
for any errors, omissions or damage
arising out of use of this information.
nt
Importa inter-
s , s e ar ch the de
er to inclu -
i t h t h e answ w a n t
w u au
atisfied . If yo ontact
If not s rrect answers klet, please c t s:
p
net for
co
i n t h is boo F a c e b ook ht
estions on
tact him arayanchangd
er/
new qu a n c o n n
ou c om/
thor. Y acebook.c
. f
//www
CRUCIAL INFORMATION: PLEASE READ BEFORE
CONTINUING:
NARAYAN CHANGDER
7. The money raised from creating the sales of
the book will help to ensure that I’m able to
produce similar books like this at a compara-
ble price.
8. YOU CAN DOWNLOAD 4000+ FREE PRACTICE
SET PDF EBOOK ON VARIOUS SUBJECTS (NURS-
ERY to UNIVERSITY LEVEL) FROM GOOGLE
DRIVE LINK https://drive.google.com/
drive/u/1/folders/19TbUXltOSN5S7FV3sL
PRACTICE BOOK» NOT FOR SALE
Contents
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1 OVERVIEW OF THE INTERNET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 PROTOCOL LAYERING . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.3 INTERNET HISTORY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
1.4 STANDARDS AND ADMINISTRATION . . . . . . . . . . . . . . . . . . . . . . . . 54
2 Application Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
2.2 CLIENT-SERVER PARADIGM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
2.3 CLIENT-SERVER APPLICATIONS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
2.4 PEER-TO-PEER PARADIGM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
2.5 SOCKET INTERFACE PROGRAMMING . . . . . . . . . . . . . . . . . . . . . . . . 90
3 Transport Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
3.2 USER DATAGRAM PROTOCOL (UDP) . . . . . . . . . . . . . . . . . . . . . . . 112
3.3 TRANSMISSION CONTROL PROTOCOL (TCP) . . . . . . . . . . . . . . 113
NARAYAN CHANGDER
1.1 OVERVIEW OF THE INTERNET
1. A link from a hypertext document to an- B. MAN, LAN, WAN
other location, activated by clicking on a C. WAN, LAN, MAN
highlighted word or image.
D. WAN, MAN, LAN
A. Hyper Text
B. Hyper Image 5. A converts a private IP to a public IP.
C. Hyperlink A. firewall
D. Hyphen B. NAT device
C. subnet mask
2. A term for individual computers and de-
vices connected to a network D. SNMP
A. Node 6. UDP packets
B. Client A. can be transmitted faster than TCP
C. Server
B. are extremely reliable
D. Internet
C. require receipts
3. Requests information from a server D. are connection-oriented
A. Client
7. An intranet that can be partially accessed
B. Server by authorized outside users, enabling busi-
C. Node nesses to exchange information over the
internet securely.
D. Internet
A. Extranet
4. Arrange the Following Types of Networks
B. Subnet Address
according to their size, from largest to
smallest? C. Internet
A. LAN, MAN, WAN D. intranet
1. C 2. A 3. A 4. D 5. B 6. A 7. A
1.1 OVERVIEW OF THE INTERNET 3
8. The Internet standard protocol for sending 13. Which of these is not included in a UDP
emails from one computer to another packet?
18. The Internet Protocol (IP) address iden- 23. Which of these IP addresses is not consid-
tifies the network and host address as- ered a private address?
signed to a device. A. 172.16.55.4
A. Internet Protocol Address (IP Ad- B. 10.4.1.99
dress)
C. 172.15.192.168
B. Local Area Network (LAN)
D. 192.168.1.1
C. Metropolitan Area Network (MAN
24. If a network crosses multiple buildings in
NARAYAN CHANGDER
D. Wide Area Network (WAN)
one city, what is it called?
19. A group of two or more computers con- A. LAN
nected so they can communicate, share B. MAN
resources and exchange information with
one another. C. WAN
B. Network E. SAN
19. B 20. A 21. D 22. A 23. C 24. B 25. A 26. C 27. D 28. A
1.1 OVERVIEW OF THE INTERNET 5
29. To defeat a DoS attack from a spoofed IP 34. A smurf attack occurs when
address you should: A. there are repeated SYN packets sent
29. D 30. A 31. C 32. B 33. D 34. D 35. D 36. B 37. A 38. C 39. A
1.1 OVERVIEW OF THE INTERNET 6
NARAYAN CHANGDER
A. WWW
B. HTTP C. network address
D. loopback adapter
C. HTTPS
D. HTML 46. A collection of web pages located on the
web servers, which are host computer on
41. Port 23 the internet
A. telnet A. Web browsers
B. ftp B. Web site
C. ssh C. Web page
D. http D. HTTP
42. The system that provides the domain 47. How many zeros are there in one thou-
owner and contact information: sand?
A. WHOIS A. 0
B. Domain411 B. 1
C. WHAATZIT C. 2
D. IPDirectory D. 3
43. Which of these statements regarding De- 48. Which is a disadvantages of a client-server
nial of Service attacks is true? network?
A. Removing the ICMP protocol from the A. When server isn’t on, clients don’t
local host will prevent future attacks. power up
B. A SYN flood occurs when the steps of B. Clients can’t connect wirelessly to the
the three-way handshake are reversed. server
C. If the attacker spoofs their source IP C. Dependent on server-if it goes down,
address, firewall blocking will not help. clients stop working
D. The Transmission control block status D. Clients are more expensive than
immediately closes every valid connection servers
to the host, preventing legitimate traffic.
49. Is the text that you type into your internet
44. The physical address of a network card is browser when you want to go to a web-
its site
A. logical address A. URL
B. soft address B. RPM
40. D 41. A 42. A 43. C 44. C 45. C 46. B 47. D 48. C 49. A
1.1 OVERVIEW OF THE INTERNET 7
50. C 51. D 52. B 53. C 54. A 55. A 56. B 57. D 58. A 59. D 60. D 61. A
1.1 OVERVIEW OF THE INTERNET 8
61. NAT uses to create/locate private IPs 66. A group of computers connected within a
as public address entries confined geographic area
A. unique port numbers A. Region
B. random number generators B. LAN
C. WAN
C. switch IPs
D. HTTP
D. RSA encryption
67. What are the Three common types of com-
NARAYAN CHANGDER
62. Consists of two or more LANs that span a puter Networks?
wide geographic area A. ROM, MAN, FAN
A. LAN B. MAN, LAN, WAN
B. Server C. RAN, PAN, RAM
C. Client D. NONE OF THE ABOVE
62. D 63. A 64. B 65. A 66. B 67. B 68. A 69. A 69. D 70. B 71. D 72. D
1.1 OVERVIEW OF THE INTERNET 9
72. Which is the largest network in the 78. Software applications that enable users
world? to easily access, view, and navigate web
pages on the internet
73. B 74. A 75. C 76. A 77. A 78. C 79. B 80. D 81. B 81. C 81. D 82. C
1.1 OVERVIEW OF THE INTERNET 10
83. Which of these is the largest planet in the 88. Which format stores information using
Solar System? tags that are defined by the application?
A. Earth A. HTML
B. Mars B. XML
C. Mercury C. JSON
D. Jupiter D. NX-API
E. Pluto 89. The network address of a host with an
NARAYAN CHANGDER
84. Can be partially accessed by authorized IPV4 address of 172.16.50.1/16 is
outside users, enabling businesses to ex- A. 172
change information over the internet se- B. 172.16
curely.
C. 172.16.50
A. Internet
D. 172.16.50.1
B. Intranet
C. Extranet 90. A secured version of HTTP used to transfer
web pages from a secure web server to a
D. HairNet web client in encrypted information
85. The protocol by which data is sent from A. HTTPS
one computer to another on the Internet B. HTTP
A. Protocols C. PPP
B. IP D. PPPoE
C. TCP
91. The first global computer network funded
D. TCP/IP by the Department of Defense
86. What is the highest-grossing Marvel A. Internet
movie without the word ‘Avengers’ in the B. ARPANET
title?
C. ARPA
A. Black Panther
D. WWW
B. Captain Marvel
C. Thor 92. Which organization maintains the
databases about website owners?
D. Doctor Strange
A. ICANN
87. Which of these statements is not true B. TLDs
about IPV6 addresses?
C. IXPs
A. They are 128 bits in length.
D. ISPs
B. Subnet masks are no longer part of an
IPV6 address. 93. Most business FTP servers require user
C. It includes numbers and hexidecimal name and passwords because that data is
addresses. confidential
83. D 84. C 85. B 86. A 87. B 88. B 89. B 90. A 91. C 92. A 93. D 94. A
1.1 OVERVIEW OF THE INTERNET 11
C. SYN and ACK packets are used to 100. Which of these types is connecting be-
query available hosts. tween countries:
D. A user must have administrative rights A. WAN
to scan each host. B. MAN
95. A protocol that allows a computer to con- C. LAN
nect to the internet over a phone line D. PAN
A. TCP/IP
101. Which connection status should be re-
B. IP viewed to determine if a remote host is
C. MPPP (Multi Link Point to Point) actively connected to a computer?
D. PPP (Point to Point) A. SYN RCVD
B. ESTABLISHED
96. TCP packets are
C. LAST ACK
A. connection-oriented
D. CLOSING
B. connectionless
C. at high risk for dropping 102. Stores incoming e-mail until users authen-
ticate and download it
D. the least common packet type
A. POP
97. The portion of the IP address that identi-
B. Email Protocols
fies the network the device is assigned to.
C. FTP
A. Internet Protocol Address (IP Ad-
dress) D. HTTP
B. Subnet Address 103. Connects several LANs. They are often
C. Metropolitan Area Network (MAN limited to a corporation or an organization,
but are sometimes accessible to the public.
D. Wide Area Network(WAN)
A. Internet
98. A wireless device that connects multiple B. Metropolitan Area Network (MAN)
users to the carrier’s 4G network, similar
to any local wireless network C. Wide Area Network(WAN)
A. 4G D. Local Area Network(LAN)
B. IPv4 104. Which IPV6 address is not valid?
C. 4G Mobile Hotspot A. 2000:343A::2BD1
D. IPv6 B. FEC0::2B:7:H210
95. D 96. A 97. B 98. C 99. C 100. A 101. B 102. A 103. C 104. B
1.1 OVERVIEW OF THE INTERNET 12
NARAYAN CHANGDER
C. HTTP 111. If a network is just the devices belonging
D. Domain Name to one person, what is it called?
A. LAN
106. Which of the following describes a secu-
rity tool for an administrator to find the B. MAN
lease holder of an IP address? C. WAN
A. WHOIS D. PAN
B. RIR E. SAN
C. IANA
112. How many sides does a hexagon have?
D. ICANN
A. 4
107. Which of the following handles notifica- B. 5
tions if TTL reaches I?
C. 6
A. The DHCP server
D. 3
B. The Session layer of the OSI model
C. ICMP 113. Which of the following scenarios best de-
scribe a situation in which a user with an
D. SNMP IP address of 169.254.11.123 cannot ac-
108. Which command syntax lists the current cess the network?
statistics of the Internet connection, includ- A. The computer cannot connect because
ing those that were sent and received? it is only configured for IPv6.
A. netstat-p B. There is a rogue DHCP server on the
B. netstat-e network.
C. netstat-a C. The DHCP server was unable to pro-
vide a leased address.
D. netstat-a
D. The address is a local host and can-
109. A collection of many different networks not be used to communicate with other de-
owned by many different entities that vices.
all share information and communicate to-
gether. 114. TTL stands for
A. Internet A. time to live
B. Intranet B. tunnel transport link
C. Extranet C. transport traffic link
D. PhishingNet D. time to link
2. The Performance of the data communica- 6. Which of these things does the internet
tion network depends on layer do?
A. The number of users A. Routes packets to the next host
NARAYAN CHANGDER
cards and letters
A. HTTP
C. IP addresses are only put on the FIRST
B. HTTPS packet in a transmission
C. FTP D. Devices add the destination AND their
D. TCP own IP addresses to requests
E. IP 15. Which transport layer protocol will notice
10. Who is the coolest? if packets arrive out of order/sequence?
A. Kelly A. TCP
B. leah B. CCCP
C. Kelly C. UDP
D. Mr Cooley D. DCCP
E. Warren 16. who can each layer talk to?
11. Layer one of the OSI Model is? A. every layer
A. Physical B. just the one above
B. Application C. the one above and below
C. Internet D. Just the one below
D. Network to Network
17. It learns mac addresses by looking at the
12. A receiving host computes the checksum on mac address field in the frame
a frame and determines that the frame is A. Router
damaged. The frame isthen discarded. At
which OSI layer did this happen? B. Hub
B. transport D. Switch
C. network 18. Transport Layer Protocol:TCP what does it
D. data link stand for?
A. Transport Control Protocol
13. In osi, which of the following layer pro-
vides error free delivery of the data B. Transmission Control Protocol
A. Network C. Translator Central Protocol
B. Transport D. Transmission Control Unit Protocol
19. What are the characteristics of the secure 24. SMTP is used for ..
version of IMAP? Choose all that apply. A. Retrieving emails
A. Prepares or presents the data (email, 27. The OSI model consists of layers
file, message) for /from transmission- A. 3
including applying encryption/decryption
B. 5
B. Ensures reliable transmission of data
C. 7
across the network.
D. 8
C. Ensures the data is correctly routed
through the network 28. makes sure data is in correct format e.g.
D. Responsible for encoding the data to mp3
be transmitted on the actual cabled or A. session layer
wireless channel.
B. applications layer
23. Data is sent across a network as equal C. presentation layer
sized D. data link layer
A. Routers
29. This protocol is responsible for packet
B. Packets switching
C. 1 and 0s A. IMAP
D. Data B. SMTP
C. POP3 C. Dosser
D. TCP D. Booter
E. IP 35. An important protocol in the internet pro-
30. Which layer do HTTP, SMTP, FTP protocols tocol suite that enables two hosts to es-
belong in? tablish a connection and exchange data.
NARAYAN CHANGDER
B. Layer 2-Data Link
C. Layer 3-Network C. Transmission Control Protocol (TCP)
D. User Datagram Protocol (UDP)
D. Layer 4-Transport
E. Layer 5-Application 36. What order do the layers work when re-
ceiving data across a network?
31. Choose all that are true
A. Link layer > Network layer > Trans-
A. The Internet works with packet switch- port layer > Application layer
ing
B. Application layer > Transport layer >
B. The Internet works with circuit switch- Network layer > Link layer
ing
C. Transport layer > Application layer >
C. Packet switched networks use band- Network layer > Link layer
width more efficiently than circuit switch-
D. Network layer > Link layer > Trans-
ing
port layer > Application layer
D. Packet switched networks rely on
routers 37. Which of these things can FTP do that
HTTP cannot?
32. What the purpose of Protocols?
A. Transfer files
A. to share information
B. Download files
B. to save information
C. Pause and restart downloads
C. to communicate between entities.
D. Restart a download from the start
D. to divide the information
38. , in a Web browser application, the Appli-
33. Which of these isn’t an advantage of cation layer protocol HTTP packages the
TCP/IP? data needed to send and receive Web page
A. Packets contain information allowing content.
them to be reassembled correctly A. Presentation Layer
B. Packets can avoid congestion individu- B. Application Layer
ally C. Session Layer
C. More efficient squatting of slav D. Network Layer
D. More efficient delivery of memes
39. UDP in the Internet Protocol suite is re-
34. What is used to DDOS? lated to
A. Shoer A. Layer 4
B. Kicker B. Layer 3
NARAYAN CHANGDER
A. session D. HTTPS
B. transport 57. manages the mapping between these
C. network logical addresses and physical addresses
A. Network
D. data link
B. Physical
52. The protocol suit that represent the main
C. Data Link
infrastructure of internet and other net-
works: D. Session
A. HTTP 58. ensures information is presented in a
B. FTP human-friendly way
62. What does POP stand for? 67. This layer is where connections are made
between networks. Routers use it to di-
A. Proper Operating Procedure
rect data packets.
NARAYAN CHANGDER
D. It creates domain for the network B. FTP, HTTP, SMTP
where it is installed in
C. TCP
73. The purpose of the Network layer is D. ETHERNET
A. Prepares or presents the data (email, 77. Traffic in the network is measured by
file, message) for /from transmission-
including applying encryption/decryption A. Blocking Probabilities
B. Responsible for controlling the packag- 80. Where does routing occur within the DoD
ing and unpacking of data into and out of TCP/IP reference model?
packets.+Sending and receiving of data. A. application
C. Responsible for packet switch- B. internet
ing.Used by routers.IP address assigned
to every device.Every packet given IP ad- C. network
dress. D. transport
84. Which protocol enables secure, real-time D. Both protocols doesn’t allow to down-
delivery of audio and video over an IP net- load
work?
89. A protocol used to receive email. With
A. S/MIME
Email is saved on a server even after it
B. RTP is downloaded to a client.
C. SIP A. Transmission Control Protocol (TCP)
D. SRTP
B. Internet Message Access Protocol
85. second layer (IMAP)
90. The purpose of the Link layer is files located on another PC and also pro-
A. Prepares or presents the data (email, vide files to other PC.According to the
file, message) for /from transmission- statement above.Which network architec-
including applying encryption/decryption ture is that?
A. Client server
B. Ensures reliable transmission of data
across the network. B. Peer to peer
C. Ensures the data is correctly routed C. LAN
NARAYAN CHANGDER
through the network D. MAN
D. Responsible for encoding the data to 94. In respect of osi model, LANs implement
be transmitted on the actual cabled or
wireless channel. A. Lower two Layers
B. All seven Layers
91. Which of these are correct?
C. Upper Five Layers
A. The APPLICATION layer en-
D. None of above
codes/decodes the message in a form
that is understood by the sender and the 95. A network protocol for secure file transfer
recipient. over Secure Shell (SSH) is called:
B. Transport layer-breaks down the mes- A. TFTP
sage into small chunks (packets). Each B. SFTP
packet is given a packet number and the
total number of packets. C. Telnet
D. FTPS
C. Network layer-adds the sender’s IP ad-
dress and that of the recipient. The net- 96. Which network layer does the SMTP pro-
work then knows where to send the mes- tocol operate at?
sage, and where it came from.
A. Transport Layer
D. Data link layer-enables the transfer of
B. Data Link Layer
packets between nodes on a network, and
between one network and another. C. Application Layer
E. MAC addressing is used by the Net- D. Network Layer
work/Internet layer. 97. third layer
92. This protocol is used to receive emails and A. session
allows you to synchronise your emails be- B. data link
tween devices.
C. physical
A. IMAP
D. application
B. SMTP
98. Which of the following is an example of a
C. POP3 email client?
D. TCP A. Google Chrome
E. IP B. Microsoft Outlook
93. A network with all the nodes acting as C. Mail
both servers and clients .A PC can access D. Mozilla Firefox
99. What does FTP stand for? (1-4) B. POP (Post Office Protocol)
A. Flat Transfer Procedure C. HTTP (Hyper Text Transfer Protocol)
102. Which of the following protocols allow 107. What are the main reasons for using lay-
for secure file transfer? Choose all that ers for network communication? (Tick 2
apply. answers)
A. FTPS A. It will transfer data quicker. This
means that files and documents will send
B. TFTP more efficiently.
C. FTP B. Layers are self contained. This means
D. SFTP that it does not need to consider what the
other layers are doing.
E. SCP
C. A layer can be changed without the oth-
103. The protocol used with financial sites ers being affected.
such as banks or PayPal is called D. It makes communication less expen-
A. HTTPS (Hyper Text Transfer Protocol sive. This means that money can be spent
Secure) on other hardware.
108. Select TWO rules TCP/IP must follow? 112. Transport Layer Protocol:UDP-Select ALL
A. Senders computer name the true statements about it
NARAYAN CHANGDER
data because the server PC store all the in the order they arrive, even if that not
data . Based on the statement above . the order they were sent.
Which network architecture is that?
D. only sends each packet once, and
A. Peer to peer doesn’t check packets have been received.
B. Bus topology This saves time but no way of knowing if
packets have been lost in transit.
C. Star topology
E. will check all packets have been
D. Client server transferred correctly. If not the miss-
ing/corrupted packets can be resent.
110. What is the Internet (Network) Layer re-
sponsible for ?
113. A protocol is..
A. Responsible for File, Email and Data
A. a decision made by the router
Transfer
B. a set of rules computers must follow
B. Responsible for controlling the packag-
ing and unpacking of data into and out of C. a way of connecting a server
packets.+Sending and receiving of data. D. essential to the CPU
C. Responsible for packet switch-
ing.Used by routers.IP address assigned 114. A network management protocol that as-
to every device.Every packet given IP ad- signs IP addresses on a network. It is part
dress. of the larger set of built-in networking pro-
tocols known as TCP/IP.
D. Responsible for passing data over a
physical network and into/out of devices. A. Dynamic Host Configuration Protocol
(DHCP)
E. Responsible for sending data across
the CPU. B. Subnetting
C. Subnet Mask
111. What order do the layers work when
sending data across a network? D. Simple Mail Transfer Protocol (SMTP)
A. Link layer > Network layer > Trans-
115. Which TWO of these protocols are for re-
port layer > Application layer
ceiving email?
B. Application layer > Transport layer >
A. SMTP (Simple Mail Transfer Protocol)
Network layer > Link layer
B. IMAP (Internet Message Access Pro-
C. Transport layer > Application layer >
tocol)
Network layer > Link layer
C. POP (Post Office Protocol)
D. Network layer > Link layer > Trans-
port layer > Application layer D. FTP (File Transfer Protocol)
116. Choose all that are true about MAC ad- C. Having Terminal Transfer Protocol
dresses D. Having Text Transfer Protocol
NARAYAN CHANGDER
C. Very expensive due to the amount of
cabling required. D. Packet Switching
D. It can handle very high data traffic
133. The main job of DNS protocol:
rates
A. It translates between domain names
128. This layer is where the hardware oper- and IP addresses
ates (Such as NICs, WiFi and Ethernet).
B. It automatically assigns IP addresses
A. Application layer to network devices
B. Transport layer C. It transfers web pages
C. Network layer D. It enables file sharing across the net-
D. Data link layer work
129. Which protocols could be used when us- 134. Which of the following is Class D IP Ad-
ing a web browser? dress?
A. HTTP A. 243.10.20.30
B. HTTPS B. 225.10.0.1
C. POP3 C. 126.10.25.1
D. SMTP D. 191.168.10.1
E. IMAP 135. Which of the following refers to a crypto-
graphic network protocol for secure data
130. Which layer does the Ethernet and Wifi
communication, remote command-line lo-
protocol belong in?
gin, remote command execution, and other
A. Layer 1-Physical secure network services?
B. Layer 2-Data Link A. Telnet
C. Layer 3-Network B. SSH
D. Layer 4-Transport C. Bcrypt
E. Layer 5-Application D. TFTP
131. The principal communications protocol in 136. This protocol is used for sending or re-
the internet protocol suite that is used to trieving files from client to server (or
route information over the Internet. server to client). It can be used to send
A. Internet Protocol (IP) files between devices.
B. Transmission Control Protocol (TCP) A. HTTP
C. User Datagram Protocol (UDP) B. HTTPS
146. Which of the following refers to a se- 150. Which of these things does the transport
cure implementation of a protocol used for layer do?
synchronizing clocks over a computer net- A. Routes packets to the next host
work?
B. Breaks the data up into packets
A. NTPsec
C. Attaches a destination address
B. SNMPv3 D. Senses the medium before transmit-
C. SRTP ting
NARAYAN CHANGDER
D. IPsec 151. Which protocol holds the email only until
you receive it?
147. It is a unique identifier assigned to net-
A. SMTP
work interfaces for communications on the
physical network segment. B. FTP
A. Frame Check Sequence (FCS) C. IMAP
B. Switch D. POP3
NARAYAN CHANGDER
B. Data Link Layer
signals (Ethernet) or radio-waves (WiFi)
C. Network Layer
A. Application
D. Application Layer
B. Transport
C. Internet 171. Select the network layer where IP ad-
D. Link dress/Packet Number/Error check is com-
pleted.
166. Which of these is a type of encryption A. Application Layer
A. Distributed denial of service
B. Transport Layer
B. Caeser Cipher
C. Internet Layer
C. Plaintext
D. Link/Physical Layer
D. SMTP
172. The protocol that manages the creation of
167. Which layer would you expect to use the packets is called
FTP protocol to upload files to a server?
A. TCP (transmission control protocol)
A. Application layer
B. IP (Internet protocol)
B. Transport layer
C. POP (Post Office protocol)
C. Network layer
D. SMTP (simple mail transfer protocol)
D. Link layer
175. How is the TCP protocol used? 179. The protocol that enables file sharing be-
tween hosts:
A. This protocol is used on the transport
C. This protocol is used on the transport 180. Data Link Layer & Physical Layer-Layer
layer. It is in charge of splitting data into 1
packets and reassembling once it reaches A. ETHERNET
the receiving device.
B. IP
D. This protocol is used on the network
C. TCP
layer. It is in charge of splitting data into
packets and reassembling once it reaches D. HTTPS
the receiving device.
181. What goes into packet of data? SELECT
176. Network Protocols are divided into ALL
184. Which of the following correctly describe 188. This is a protocol that dictates how data
steps in the OSI data encapsulation pro- is sent over a WAN
cess? (Choose two.) A. HTTP
A. The transport layer divides a data B. TCP/IP
stream into segments and may add relia-
C. FTP
bility and flow control information.
D. SMTP
B. The data link layer adds physical
source and destination addresses and an 189. Which of these is not an email protocol?
NARAYAN CHANGDER
FCS to the segment. A. SMTP
C. Packets are created when the net- B. POP3
work layer encapsulates a frame with
C. IMAP4
source and destination hostaddresses
and protocol-related control information. D. FTP
D. Packets are created when the network 190. An important protocol in the internet pro-
layer adds Layer 3 addresses and control tocol suite that is generally used when
information to a segment. speed in transmission is more important
than accuracy since the sending computer
185. Which of these are transport layer proto- doesn’t verify that the packets were cor-
cols? rectly received.
A. FTP A. User Datagram Protocol (UDP)
B. TCP B. Domain Name System (DNS)
C. UDP C. Hypertext Transfer Protocol (HTTP)
D. IP D. Hypertext Transfer Protocol Secure
(HTTPS)
186. A network administrator is verifying the
configuration of a newly installed host by 191. What does Protocol mean?
establishing an FTPconnection to a remote A. Rules
server. What is the highest layer of the B. Security
protocol stack that the network adminis-
C. Services
trator isusing for this operation?
D. Orders
A. application
B. presentation 192. Select all the True statements:
A. A network protocol is an agreed way
C. session
of how to communicate over a network.
D. transport
B. WiFi networks use radio frequencies
187. It is a protocol that provides reliable com- in the 2.4 GHz or 5 Ghz frequency ranges.
munication or service. C. WAP stands for Wide Area Protocol
A. TCP D. 2.4 GHz frequency networks are
slower than 5GHz networks, but have a
B. UDP
stronger signal range.
C. DNS E. WiFi networks typically create a ring
D. HTTP/s network topology
204. Application Layer Protocol:IMAP is used B. A set of specifications one must follow
for? to communicate
A. Used by Web Browsers to access web- C. A globally adopted protocol
sites and communicate with web servers. D. Layers of the networking model
B. A more secure version of HTTP uses
209. This protocol is used to receive emails. It
Encryption
will delete the email from the server once
C. A more secure version of HTTP uses you have downloaded it to your device.
NARAYAN CHANGDER
Huffman Trees
A. IMAP
D. Used to access, edit and move files be-
B. SMTP
tween devices on a network. e.g. to ac-
cess files on a server from a client com- C. POP3
puter. D. TCP
E. Used to retrieve emails from a server. E. IP
216. Which of these is an “Network Layer” 221. A protocol that combines HTTP with the
protocol? Secure Sockets Layer (SSL) protocol to se-
A. IP curely transfer web content between com-
puters.
B. Ethernet
A. Hypertext Transfer Protocol Secure
C. WiFi
(HTTPS)
D. FTP
B. Simple Mail Transfer Protocol (SMTP)
217. Which layer does the IP protocol belong
in? C. Post Office Protocol 3 (POP3)
223. Hub, Modem are devices for which 227. divides information into packets
layer? A. data link layer
A. responsible for final transmission of B. transport layer
digital data bits from the Physical layer
of the sending (source) device over net- C. presentation layer
work communications media to the Phys- D. applications layer
ical layer of the receiving (destination) de-
vice. 228. Which of these are true for TCP? (Select
NARAYAN CHANGDER
all that apply)
B. checks for physical transmission
A. This protocol operates at the Transfer
errors and packages bits into data
Layer
“frames”.
B. This protocol operates at the Link
C. support routing
Layer
D. manages the sequence and flow C. this protocol always resends lost pack-
ets
224. Layer 3-Transport:Provides transport of
data between devices by splitting files into D. this protocol does not resend lost pack-
data packets and checking that they have ets
been sent and received correctly.
229. Application Layer Protocol:HTTP is used
A. TCP for?
B. FTP, HTTP, SMTP A. Used by Web Browsers to access web-
sites and communicate with web servers.
C. IP
B. A more secure version of HTTP uses
D. HTTPS Encryption
225. A secure version of the HTTP proto- C. A more secure version of HTTP uses
col offering traffic encryption is known Huffman Trees
as:Choose all that apply. D. Used to access, edit and move files be-
A. HSPA tween devices on a network. e.g. to ac-
cess files on a server from a client com-
B. HTTP over SSL puter.
C. HSRP E. Used to retrieve emails from a server.
D. HTTP over TLS 230. The Layer responsible for end to end de-
E. HTTPS livery of the entire message is
A. Data Link
226. Which of the following protocols was de-
signed as a secure replacement for Tel- B. Transport
net? C. Physical
A. CHAP D. Internet
B. FTP 231. fifth layer
C. SNMP A. session
D. SSH B. transport
NARAYAN CHANGDER
C. 2005 B. 1937
D. 2007 C. 1962
12. The Space Race happened between two na- 18. Year of the history of computer networks
tions except rebuilt.
17. Best thing of the internet. 23. Which search engine website released in
1997?
A. It connect people, countries, cultures
and information A. Bing
B. Read Books B. Google
C. It makes your own food C. Yahoo
D. Brushes your teeth D. Ask Jeeves
24. Who is the creator of Facebook? 30. When was the First email sent?
A. Tim Berners Lee A. 1969
B. Mark Zuckerberg B. 1970
C. Martin Sataruja C. 1971
D. none of above D. 1972
25. This is the year when email was invented. 31. Which of the following is NOT an example
NARAYAN CHANGDER
A. 1991 of entertainment on the internet?
B. 1971 A. Music
C. 1969 B. Social networking
D. 1994 C. Games
D. Movies/TV shows
26. Who was the first person to send a mes-
sage over the internet? 32. What is the language of the internet?
A. Tim Berner-Lee A. HTML
B. Charley Kline B. English
C. Thomas Edison C. Spanish
D. Michael Kors D. Tech
27. In 1989 what was the name of the person 33. The probability of failure-free operation of
who proposed the WWW a software application in a specified envi-
A. Ray Tomlinson ronment for a specified time.
B. Ada Lovelace A. Software Reliability
C. Tim Burners-Lee B. Software Quality
D. Charles Babbage C. Software availability
28. It is easiest to imagine the Internet as D. Software Safety
A. spider web 34. In what year did the Internet become uni-
B. American military versal?
C. from interconnected computer net- A. January 1, 1983
works B. January 1, 1984
D. Internet service C. January 1, 1985
29. In this technique, there is no direct contact D. none of above
between users and their programs during
execution. 35. What is the difference between the Inter-
net and the Web?
A. Time Sharing
A. There is no difference.
B. Batch Processing
B. The web deals with web browsers.
C. System Processing The internet is a much larger network of
D. Message Passing connected computers.
C. The Internet is uniquely American, the 40. What is a comprehensive network of com-
Web is World-Wide. puters?
37. A website is a place on the internet where C. Download information and data
you can find information or do some activ- D. none of above
ities.
42. From ARPANET, the network’s name be-
A. correct
came
B. vale
A. ANSNET
C. don’t know
B. NSFNET
D. hard question
C. INTERNET
38. Who invented the World Wide Web in D. none of above
1989?
A. Steve Jobs 43. What was the first mechanical Computer
called?
B. Tim Berners-Lee
C. Zendaya A. Difference Engine
NARAYAN CHANGDER
C. In April of 1964 B. Ensures that all computers will be in
D. In September of 1964 good working order by 2020.
C. A plan for all websites to look the same
47. Who is considered the “Father of the Inter- in the future
net”?
D. A plan for all websites to be combined
A. Vinton Cerf into a single, massive, universal website
B. Steve Jobs
53. Who had the original IDEA for the inter-
C. Bill Gates net?
D. Zendaya A. Bob Khan
48. What does the Internet come from? B. Vinton Kerf
A. International + Networking C. Spiderman
B. Interaction + Networking D. Nikola Tesla
C. Information + Networking 54. The internet started in the
D. none of above A. 1940’s
49. Where was the second computer located? B. 1960’s
A. UCLA C. 1990’s
B. Stanford D. none of above
C. USSR 55. Wikipedia the world’s history database
D. Estonia was launched in
A. 1999
50. What was the first digital Computer
called? B. 2000
A. Difference Engine C. 2001
B. ABC(Atanasoff-Berry Computer) D. 2004
C. ENIAC 56. A type of technique in which dumb termi-
D. Apple nals are connected to a central computer
system.
51. This protocol defines how messages are A. Time Sharing
formatted and transmitted, and what ac-
tions web servers and browsers should B. Message passing
take in response to various commands. C. Batch environment
A. WWW D. User environment
57. The Advanced Research Projects Agency 62. What does WWW. stand for?
Network was better known as what?
A. World Wide Web
59. What is a “network”? 64. when was the first message sent over the
internet?
A. Group of 2 or more computer systems
linked together. A. 1991
NARAYAN CHANGDER
A. Web 1.0 74. What was the network that became the
basis of the Internet?
B. Web 2.0
A. DARPA
C. Web 3.0
B. ARPA
D. none of above C. ARPANET
70. In 1958, ARPA was created which stands D. TCP/IP
for 75. The name of the first network connec-
A. Arpanet Research Projects Agency tion that became the basis of the Internet
was?
B. Advanced Research Projects Associa-
tion A. UCLAnet
79. The Internet Network was eventually 85. What organization sets standards and con-
turned over to the from DARPA so it trols for the net to function effectively and
would continue with its original mission of efficiently which also assigns unique iden-
90. Who is the founder of Microsoft? 96. What is a collection of web pages fol-
lowing the http protocol that can be ac-
A. Bill Gates
cessed via the Internet from any part of
B. Steve Jobs the world?
C. Charles Babbage A. Internet
D. Professor John Vincent Atanasoff B. World Wide Web
C. Google
91. A is a human-readable way of locating
NARAYAN CHANGDER
D. Domain Name System
an Internet site.
A. domain name 97. which one is local area network?
A. LAN
B. IP address
B. WAN
C. hierarchy
C. ring
D. domain name system (DNS)
D. star
92. The name of the first browser on the Inter- 98. According to the lesson, what did Vint Cerf
net was? co-create?
A. Firefox Web Browser A. the zipper
B. Netscape Web Browser B. the internet
C. High View Web Browser C. the ballpoint pen
D. Mosaic Web Browser D. the hard drive
99. Where does .gov come from?
93. Which shopping giant launched in 1995?
A. Governing
A. Lovefilm
B. Government
B. Tesco C. Govern
C. Amazon D. none of above
D. Ebay 100. What’s the name of the inventor of the
Difference Engine?
94. Meaning of “www”.
A. Albert Einstein
A. world wide internet
B. Stephen Hawking
B. world wide web
C. Charles Babbage
C. world wide community D. Konrad Zuse
D. world wide government
101. Who invented the first computer program
95. Year the internet arrived in Portugal. was used to help the Analytical Engine cal-
culate number?
A. 70’s
A. Steve Jobs
B. 80’s B. Ade Lovelace
C. 50’s C. Bill Gates
D. 60’s D. Dr. Douglas Engelbart
102. Artificial Intelligence 108. University that sent the first message.
A. Web 1.0 A. University of Glamorgan
104. What was the name of the first internet D. none of above
browser with a graphical interface?
110. Who invented the World Wide Web
A. Firefox (WWW)?
B. Netscape A. Vint Cerf
C. Erwise
B. Tim Berners-Lee
D. Google
C. Robert Kahn
105. He is one of the two fathers of the inter-
D. JC R Licklider
net.
A. Gary Thuerk 111. TCP stands for?
B. Robert Tomlinson A. Transmission control program
C. Robert Khan B. Transmission control protocol
D. Shiva Ayyadurai C. Transfer control program
106. How many years ago was the internet D. Transfer control protocol
released to the public?
A. 52 112. What year was the Internet invented?
B. 28 A. 1975
C. 13 B. 1961
D. What do you mean it hasn’t come out C. 1988
yet
D. 1991
107. ARPANET was composed of the following
four California universities except 113. Why was the internet invented?
A. University of California Santa Barbara A. For an American military project.
B. University of California Los Angeles B. So people could look up information.
C. University of Ohio C. So people could use social networking.
D. Stanford Research Institute D.For a NASA project.
E. University of Utah D. For a NASA project.
114. An Ethical use of the web prevents: 120. The Internet is a project of DARPA which
A. Plagiarism wasused for the development of new tech-
nology for what purpose?
B. Cyber Bullying
A. Commercial use
C. Slander
B. Military use
D. All of the above
C. Research and development
115. Which of the following is a popular use
D. none of above
NARAYAN CHANGDER
of the web?
A. E-commerce 121. A is an arrangement with the biggest
category at the top and subcategories be-
B. Social networking
low, like a triangle.
C. Cloud computing
A. domain name
D. All of the Above
B. IP address
116. What was the first graphical web C. hierarchy
browser?
D. domain name system (DNS)
A. Apple
B. Mosaic 122. Which organization is located at MIT
( Massachusetts Institute of Technology)
C. Google that creates standards and ways to im-
D. Yahoo prove the quality of the web?
117. The genius who created the world wide A. NSF (National Science Foundation
web is B. ICANN (Internet Corporation for As-
A. Robert Kahn signed Names and Numbers)
B. Robert Taylor C. W3C ( World Wide Web Consortium )
C. Tim Berners-Lee D. none of above
D. none of above 123. When was the first workable prototype
of the Internet?
118. The first email was sent in the
A. 1950s A. 1960’s
B. 1960s B. 1970’s
C. 1970s C. 1980’s
D. 1980s D. 1990’s
119. Which of the following could be a subdo- 124. What social media giant launched in
main of the domain bicycles.com? 2004?
A. bicycles.com.org A. Twitter
B. bicycles.org B. Facebook
C. bicycles.co.uk C. Myspace
D. about.bicycles.com D. Instagram
125. Where is the “top level domain A. To develop standards for the World
name” located in the following Wide Web.
URL:www.nchs18.org?
D. Because you can find almost anything A. Upload information and data
you want to know on the internet B. Download information and data
127. The “Victorian internet” is actually? C. Search for information and data
B. Batch Environment 133. the first letter sent over the internet is?
C. Unit Environment A. AND
D. System Environment B. GI
136. What is Link used for? 142. What was the first government network
A. Upload information to use TCP/IP protocol?
A. Netscape
B. Search
B. .gov
C. Link a website from one page to an-
other C. Arpanet
D. none of above D. Napster
143. Instant communication is one great bene-
NARAYAN CHANGDER
137. In what year did these websites launch?
fit of the interent. Which of the following
Twitter, Spotifty and Netflix.
is NOT an example of that.
A. 2003 A. .E-mail
B. 2004 B. Instant messaging
C. 2005 C. Searching Google
D. 2006 D. Chat rooms
138. Writable phrase 144. What was the most popular web browser
in 1995?
A. Web 1.0
A. Mosiac
B. Web 2.0
B. Google Chrome
C. Web 3.0
C. Netscape Navigator
D. none of above
D. Internet Explorer
139. What is .com from? 145. What was the products that IBM became
A. Communication well known for before computers?
B. Commercial A. Calculators
C. Company B. Typewriters and business machines
D. none of above C. Keyboards
D. none of above
140. The “http” of “http://thunderscience.org/folder”
is 146. The “folder” of “http://thunderscience.org/folder”
is
A. protocol
A. protocol
B. domain name
B. domain name
C. path
C. path
D. sub domain
D. sub domain
141. What year did Disney + release, replac- 147. Person who created the first email pro-
ing the failed predecessor Disney Life. gram?
A. 2019 A. Ray Tomlnson
B. 2020 B. Ray Milton
C. 2021 C. Ray Axel
D. none of above D. Ray Jackson
148. Which one is not a Web Browser? 154. Internet can help you find the shortest
A. Internet Explorer route.
160. What does HTTP stand for? 166. Initially, there were more than 2.4 billion
A. File Transfer protocols people on the Internet
A. correct
B. Internet Protocol
B. vale
C. Hypertext Transfer Protocol
C. don’t know
D. Hydrotherapy training pandas
D. hard question
161. Who adopted TCP/IP on january, 1983?
NARAYAN CHANGDER
167. Cerf was the recipient of the ACM Alan
A. ARPANETI
M. Turing which is also known as?
B. FFG A. Nobel Prize of Internet Science
C. ABBOT B. Nobel Prize of Computer Science
D. ARPANET C. Nobel Prize of Computer Development
162. Who toyed with the idea of a “ world D. Nobel Prize of Internet Development
wireless system”?
168. ISP comes from the word:
A. Noah Tesla
A. Internet Service Projector
B. Gary Tesla
B. Internet Service Provider
C. Nikola Tesla
C. Internet Service Programmer
D. Joshua Tesla
D. none of above
163. Who invented the World Wide Web?
169. The social media giant known as MyS-
A. Tim Berners-Lee pace launched in
B. Charley Kline A. 2000
C. Thomas Edison B. 2001
D. Michael Kors C. 2003
D. 2005
164. What’s the name of the inventor of the
first digital computer? 170. When was the first message sent over
A. Albert Einstein the internet?
B. Stephen Hawking A. 1991
C. Charles Babbage B. 1982
D. Professor John Vincent Atanasoff C. 1976
D. 1969
165. in wide area network how man comput-
ers can you have connected? 171. What does the word Internet mean?
A. 11 or more A. network of networks
B. 10 or more B. Red
C. 1 or more C. telephone
D. 2 or more D. computer
172. What is the WWW? 178. He is the co-inventor of the TCP/IP Pro-
A. World Web Wide tocols.
184. What is a Web Browser? 187. The first internet message was sent from
to Stanford.
A. Is a program for playing games on our
computer A. UT Austin
B. Is a program for accessing the Inter- B. Harvard
net on our computer. C. Duke
C. Is a program for enabling Email on our D. UCLA
computer.
NARAYAN CHANGDER
188. Inventor of the internet?
D. none of above
A. Department of War
185. The browser is B. Department of Child
A. a terminal device on a telecommunica- C. The US Department of Defense
tions line that allows two or more speak-
D. Department of Food
ers to carry on a conversation when they
are not within direct earshot. 189. When was the first website released
B. a pair of lace speakers placed over the when the WWW was born.
ears for listening. A. 1989
C. a television receiving device that con- B. 1990
verts a signal received by radio or cable
C. 1991
network into a moving image and accom-
panying sound. D. 1994
D. a software program that greatly simpli- 190. ARPANET stands for?
fies the user’s work when visiting differ-
A. Advanced Research Project Agency
ent locations on the Internet.
Network
186. What year was the birth of the internet? B. Advanced Research Programmed Auto
Network
A. 1966
C. Advanced Research Project Automatic
B. 1968
Network
C. 1969
D. Advanced Research Project Autho-
D. 1971 rized Network
12. It tells the meaning of each section of bits C. To generally identify an end-point in
and indicates the interpretation of each a network to support communication and
section packet routing
A. timing D. To identify a sub-set of end points, de-
B. syntax vices or network components during any
C. semantics given communication
NARAYAN CHANGDER
13. Standards organization covering the entire nology for the benefit of humanity
field of worldwide telecommunication are A. ITU
efficiently produced in a timely manner
B. IEEE
A. ITU
C. EIA
B. IEEE
C. ANSI D. none of above
D. none of above 16. is a private nonprofit orgfanization that
14. What is the aim of an IP address? oversees the development of voluntary
consensus standards
A. To uniquely identify a point on a net-
work to allow packets to be sent to the A. ISO
correct destination B. ANSI
B. To uniquely identify every device, so
C. ITU
that communication between devices can
be achieved D. none of above
2.1 Introduction
1. In the event that there is no NTP Protocol 4. Select every email protocol
on the Server, what problem will occur? A. IMAP
A. can work normally B. SMTP
B. Failed to retrieve data from the server. C. POP3
C. causing the client and server time to D. TCP/IP
be out of sync
5. What kind of protocol is a web browser?
D. right on all counts A. NTP
2. Which three protocols operate at the B. FTP
application layer of the TCP/IP model? C. HTTP
(Choose three.) D. DNS
A. TCP
6. Which protocol is used as the transport
B. ARP protocol for a video application?
C. DNS A. TCP
D. SMTP B. UDP
C. FTP
E. TFTP
D. RDC
3. In a mesh topology the number of cables
required to form a network is 7. FTP uses and port no data and Con-
trol connection
A. n
A. 20, 21
B. n-1 B. 19, 20
C. n(n-1)/2 C. 21, 22
D. One backbone and n drop line D. 22, 23
8. sometimes referred to as just “POP, “ is 13. Which of the following attribute is used for
a simple, standardized method of deliver- a cookie to last beyond a single browsing
ing e-mail messages. A POP3 mail server session?
receives e-mails and filters them into the
A. Average
appropriate user folders. When a user con-
nects to the mail server to retrieve his B. Lifetime
mail, the messages are downloaded from C. Maxage
mail server to the user’s hard disk.
D. Lowage
NARAYAN CHANGDER
A. POP3 Post Office Protocol
B. DHCP Dynamic Host Configuration Pro- 14. Protocol used when sending Mails
tocol
A. IMAP
C. NNTP Network News Transfer Proto-
col B. SMTP
D. FMTP Forwarding Mail Transfer Proto- C. POP3
col D. HTTPS
9. Which protocol would download the email
15. Which protocol is used for sending
from to your computer and delete it from
emails?
the server?
A. FTP A. FTP
B. SMTP B. IMAP
C. POP3 C. SMTP
D. IMAP D. POP3
10. UDP and TCP are both layer protocols.
16. The IETF
A. data link
A. Is responsible for regulating the inter-
B. Network net.
C. Transport B. Develops and promotes mandatory In-
D. none of the above ternet standards
11. The protocol used to convert IP Address to C. Is a group of volunteers, engineers
Domain Name is and network designers who oversee inter-
A. HTTPS net standards
18. The conversation between your computer 23. What is layer 7 of the OSI model?
and a server when requesting a website is A. Application
mainly made up of requests
A. GET 26. What are the upper three layers of the OSI
Model? (Choose three)
B. POST
A. Data Link
C. PUT
B. Session
D. HTTP
C. Application
21. Which part of the architecture sends a D. Transport
POST request? E. Presentation
A. Client 27. The application one uses to access web
B. Server pages is called
C. Database A. web browser
29. Which layer is responsible for formatting 34. What does ISP stand for?
data, compression and encryption? A. Internet Service Provider
A. Application B. Internet Switch Protocol
B. Presentation C. Internet Service Protocol
C. Session D. Internet Switch Provider
D. Transport 35. Which two tasks does the Dynamic Host
Configuration Protocol perform? (Choose
NARAYAN CHANGDER
30. is a communications profile designed
two)
to support the exchange of data between
flight data or flight plan processing sys- A. Set the IP gateway to be used by the
tems network.
A. FMTP-Flight Message Transfer Proto- B. Configure IP address parameters from
col DHCP server to a host.
B. NNTP-Network News Transfer Proto- C. Assign and renew IP address from the
col default pool.
D. Perform host discovery used
C. POP3-Post Office Protocol
DHCPDISCOVER message.
D. DHCP-(Dynamic Host Configuration
E. Monitor IP performance using the
Protocol
DHCP server.
31. An FTP protocol is used for 36. What layer is responsable for moving data
A. Copying files from one host to another through the network connection?
B. Distributing web pages A. Application layer
C. Accessing emails B. Session layer
D. Creating secure communications C. Presentation layer
D. Transport layer
32. FUNCTIONS OF APPLICATION LAYERThis
layer provides access for global informa- 37. Identify the incorrect statement
tion about various services. A. FTP stands for File Transfer Protocol
A. Directory Services B. FTP uses two parallel TCP connections
B. File Transfer, Access and Management C. FTP sends its control information in-
(FTAM) band
C. Network Virtual Terminal D. FTP sends exactly one file over the
data connection
D. Mail Services
38. The part of the internet that users can ac-
33. Disadvantages of HTTP Protocol Which of cess using web browsers such as Google
the following is wrong? Chrome is called the?
A. Difficult to prevent data theft A. World Wide Web
B. can detect information easily B. The Intranet
C. Text can be converted or edited easily. C. HTTP
D. all wrong D. The Deep Web
39. Which of the following is needed to access 44. Which of these is NOT part of TCP’s role?
email when sender and receiver are on the
A. Sets the rules for how devices connect
same system
40. Which of the following is NOT a proper con- 45. is a network management protocol
tent type for an HTTP response? used to dynamically assign an Internet Pro-
A. HTML document tocol (IP) address to any device, or node,
on a network so they can communicate us-
B. JSON data ing IP. DHCP automates and centrally man-
C. JPEG image ages these configurations rather than re-
quiring network administrators to manu-
D. POST request ally assign IP addresses to all network de-
vices. DHCP can be implemented on small
41. Which one of the following is an Applica-
local networks as well as large enterprise
tion Layer protocol?
networks.
A. IPv4
A. DHCP (Dynamic Host Configuration
B. Ethernet Protocol)
C. TCP B. POP3 (Post Office Protocol)
D. SMTP C. NNTP (Network News Transfer Proto-
col)
42. Why is the application layer important?
D. FMTP (Forwarding Mail Transfer Proto-
A. The application layer provides trans- col)
port services to the network.
B. The application layer provides the MAC 46. The Acronym MIME stands for
address. A. Multipurpose Internet Mail Extension
C. The application layer provides the ap- B. Multipurpose Internet Mail Email
plication an interface to the network.
C. Multiple Internet Mail Extension
D. The application layer is not needed.
D. Multiple International Mail End
43. Which message does an IPv4 host use to
reply when it receives a DHCPOFFER mes- 47. T/F:What are considered types of
sage from a DHCP server? servers? (choose all that apply)
A. DHCPACK A. File
B. DHCPDISCOVER B. Print
C. DHCPOFFER C. Web
D. DHCPREQUEST D. Email
NARAYAN CHANGDER
C. Presentation layer
49. dns Domain Name Service
D. Transportation layer
A. 53
B. 67 55. In which type of network is the data ac-
cessed from a peer device without the use
C. 68 of a dedicated server?
D. 22
A. Peer-to-Peer Networks
50. Which protocol would you use to transfer B. Client-Server Networks
files?
C. Two-Tier Networks
A. FTP
D. Three-Tier Networks
B. SMTP
C. POP3 56. Which one of the following tool is used
to manually query the name servers to re-
D. HTTP solve a given host?
51. Which one of the following protocols de- A. ipconfig
fine an automated service that matches re- B. tracert
source names with the required numeric
network address? C. netstat
A. DHCP D. nslookup
B. DNS 57. Which protocols provide reliable data
C. HTTP transfer
D. FTP A. UDP
70. Email is emerging as one of the most D. File Transfer, Access and Management
valuable services on the internet today. (FTAM)
Most of the internet systems use as
a method to transfer mail from one user 75. Which of the following is an email proto-
to another is a push protocol and is col?
used to send the mail whereas POP (post
A. TCP
office protocol) or IMAP (internet message
access protocol) are used to retrieve those B. IMAP
mails at the receiver’s side.
NARAYAN CHANGDER
C. UDP
A. HTTP
D. FTP
B. FTP
C. SMTP 76. smtp Simple Mail Transfer Protocol
D. TELNET A. 21
71. What layer formats data for encryption? B. 25
A. Presentation layer C. 23
B. Application layer D. 53
C. Transport layer
D. Session layer 77. DHCP-Dynamic Host Configuration Proto-
col
72. What do websites use to remember who
A. 67
you are?
A. biscuits B. 68
B. cookies C. 80
C. crackers D. 443
D. cupcakes
78. Which of the following domain name is re-
73. Which of the following is an internet pro- cently added?
tocol?
A. .biz
A. HTTP
B. .gov
B. HTML
C. .net
C. CSS
D. UTP D. .int
74. FUNCTIONS OF APPLICATION LAYERIt al- 79. Which is the first of the four layers in the
lows a user to log on to a remote host. The TCP/IP model?
application creates software emulation of
A. Internet
a terminal at the remote host.
A. Network Virtual Terminal B. Transport
80. When a client is requesting an initial ad- 84. Which protocol is used to transfer files
dress lease from a DHCP server, why from one computer to another?
is the DHCPREQUEST message sent as a
82. The function of the correct application 87. File Transfer Protocol (FTP) is a / an
layer is A. Transport Layer Protocol
A. Acts as a interface between the user B. Network Layer Protocol
and the application.
C. Application Layer Protocol
B. Serves to forward data to the data link
layer. D. Physical Layer Protocol
C. responsible for data processing
88. The HTTP protocol:
D. Acts as a renderer to the presentation
layer. A. The GET request results in all of the
page data being displayed.
83. Which protocol governs the way we trans-
B. Data sent by the server is sent in one
fer and load hypertext?
file, broken up into various packets.
A. FTP
C. Data sent by the server is sent in sev-
B. SMTP eral files broken up into packets.
C. POP3 D. Data sent by the server arrives at the
D. HTTP client in the order it is sent.
NARAYAN CHANGDER
suits for distributing digital media over a
network? providing correct login and sign-in creden-
A. Digital Network tials, a user may access a remote system’s
privileged functionality.
B. Peer to Peer Network
A. HTTP
C. Client Server Network
B. FTP
D. Token Ring Network
C. SMTP
91. During an FTP session the control connec- D. TELNET
tion is opened
A. Once 96. When a DHCP server is configured,
which two IP addresses should never be
B. manytimes
assignable to hosts? (Choose two)
C. Twice
A. network or subnetwork IP address
D. NONE
B. broadcast address on the network
92. Which layer is responsible for creating and C. IP address leased to the LAN
maintaining dialogs?
D. IP address used by the interfaces
A. Application
E. manually assigned address to the
B. Presentation clients
C. Session
97. DHCP is usually employed for end user de-
D. Transport vices. For which one of the following de-
93. What protocol is used for file-sharing and vices is a static address used?
print services on Microsoft networks? A. laptop computer
A. HTTP B. desktop computer
B. HTTPS C. gateway device
C. SMTP D. mobile device
D. SMB
98. Which part of the architecture sends the
94. Another name for a web address is initial HTTP request?
A. HTTP A. Client
B. HTML B. Server
C. URL C. Database
D. CSS D. HTML
99. Which of these layers are only present in designed specifically for newsgroup arti-
the OSI model? cles.a newsgroup may be similar to a fo-
rum, where users can read posts from
NARAYAN CHANGDER
B. Transport layer
C. Internet layer C. SMTP
D. Session layer D. TELNET
13. Which scripting language is commonly 18. What does a server store?
used for server-side scripting?
A. Client data
A. PHP
B. JavaScript B. Software and client data
19. What is meant by latency in the perfor- 24. Which is NOT true of JSON?
mance of a network? (6-9)
A. More complicated for a human to read
A. The amount of time data takes to travel
B. More compact code
from the source to the destination
B. The maximum rate that data can be C. Easier for computers to parse
transferred at D. Easier to create
C. The number of errors that are found in
25. Web application is usually an example of
a data packet after transmission
NARAYAN CHANGDER
client-server application. The client appli-
D. The route a packet takes when it is be- cation is
ing transmitted
A. The browser
20. Which is NOT true of the websocket pro-
B. The XAMPP
tocol?
C. The Apache
A. Provides a persistent, bi-directional
real-time communication channel be- D. The MySQL
tween client and server
26. This is a krunker.io multiplayer URL.
B. Is an example of a modern API used
Which part of the URL shows the server
for communication
we are playing on. “krunker.io/?
C. Typical uses are online gaming and in- game=SYD:h12zs”
stant messaging
A. game
D. Increases data usage
B. SYD (for sydney)
21. Which transmission media is capable of
C. h12zs
having a much bigger bandwidth?
A. Coaxial D. krunker.io
40. is an HTTP method that deletes data 45. DOM stands for?
from the server. A. Document Object Model
A. GET B. Digital Object Model
B. POST C. Document Outlay Model
C. PUT D. none of above
D. DELETE 46. Which one of these items is true of a peer-
to-peer network?
NARAYAN CHANGDER
41. The advantages of a client-server network
include: A. No network wide security in place
A. security is created, managed and en- B. Central control of security
forced C. Has a central point of failure
B. backup of data is centralised D. Easier to perform network wide back-
ups
C. many computers have access to cen-
tralised resources 47. Which device performs the function of de-
D. All options termining the path that massages should
take through internetwork?
42. Which of the following is not a type of A. A router
server?
B. A firewall
A. File Server
C. A web server
B. Email Server
D. A DSL Modem
C. Webpage Server
48. Which email protocol allows an email client
D. PowerPoint Server to download email messages to the local
computer?
43. In a client-server network:
A. IMAP4
A. there can only be one server
B. SMTP
B. there is one “client” and many
“servers” which provide printing, file stor- C. TCP
age and Internet access. D. POP3
C. there may be hundreds of clients 49. Which scripting language is commonly
D. All files and software are held by the used for client-side scripting?
server. A. PHP
59. Why is a client reliant on a server? B. A protocol that state the error check-
A. The client might might get abducted ing that will be used in communication
without the server C. A database query
B. The server prevents the client from D. A protocol that splits data up in to pack-
breaking down ets and then reassembles it
C. Client retrieves saved data and soft- 64. choose 2:on a client server it is easier to
ware from the server
NARAYAN CHANGDER
D. The clients does not power on without A. manage backups
the server
B. manage security files
60. Which of the following is a disadvantage C. to set up
of a peer to peer network?
D. use as it does not need specialist staff
A. Files and folders cannot be centrally
backed up. 65. What is a client server managed by?
B. Does not need an expensive server A. Computer
as individual workstations are used to ac- B. Server
cess files. C. Motherboard
C. The server is expensive to purchase D. Microwave
D. Files are stored in a centralised loca-
tion, meaning it is easier to backup. 66. Fill in the missing gap:Peer-to-Peer Net-
works is an that splits tasks between
61. is a remote computer which provides infor- pairs.
mation (data) or access to particular ser- A. Program
vices.
B. Application
A. Client
C. Programme
B. Host
D. AI
C. Server
67. With a peer-to-peer model files are saved
D. none of above to
62. What is the function of the DNS server? A. To a file server
A. It maps the IP address to MAC address B. The hard disk of the workstation
B. It translates a computer domain name C. The cloud
to the associated IP address D. none of above
C. It manages the domain that clients are
68. Which is not true in a client-server net-
assigned to
work?
D. It accepts HTTP requests from clients
A. A server manages access to the inter-
and server
net
63. What is an API? B. A client makes requests to the server
A. A set of protocols which define how for data and connections
two applications interact with each other C. A server runs a backup of data
D. Each peer is responsible for its own 73. What is a disadvantage of a LAN?
backup A. Site (software) licences are likely to be
78. Most web applications nowadays are ex- 83. Which is not an advantage of the client-
ample of client-server application that in- server model?
corporates a database such as MySQL.
A. Easier to manage security of files
This database is usually stored in
A. Client computer B. Easier to take backups of all shared
data
B. Server computer
C. Third party computer between Client C. Easier to install software updates to
and Server all computers
NARAYAN CHANGDER
D. Parts in client, parts in server D. Offers a single point of failure
79. Which of these are functions that servers 84. How does client-side scripting differ from
can perform? server-side scripting?
A. Controls the level of user access to
A. Execution location
files and software
B. Controls installation of software on the B. Programming language
client computers C. Execution speed
C. Controls access to network printers
D. Functionality
and managing print queues
D. Controls client computer access to the 85. Who would you use to make your website
Internet accessible to everyone on the WWW?
E. All of the above
A. Web server
80. Which of the following is not a type of
B. Web host
server?
A. File Server C. URL
B. Email Server D. none of above
C. Webpage Server
86. To make a computer becomes a web server
D. PowerPoint Server this software could be installed
81. the service providers A. Apache
A. Client
B. Javascript
B. Servers
C. PHP
C. Host
D. none of above D. Visual Basic
82. Which of the following is an example 87. is the provider of a resource or a ser-
of what is usually done using client-side vice.
scripting?
A. desktop
A. Accessing web databases
B. host
B. Simple validation of user input
C. Create stylesheet files using PHP C. server
D. Complex calculations D. client
88. In the client-server model devices are con- C. Many users, separated by large dis-
nected to the server via a central.. tances, can run a program or application
at the same time
97. Which one of these items is true of a client- 102. What is cloud storage?
server network?
A. Storing data on the server of another
A. Needs a network manager to run the company, accessible through the Internet
network
B. Storage accessible anywhere with an
B. No centralised management internet connection
C. All computers have equal status C. Running programs on a remote server,
D. No dependency on a server accessible with an Internet connection
NARAYAN CHANGDER
D. All of the above
98. In cloud computing:
A. Software and applications are com- 103. How does a hub differ from a switch?
monly accessible via a web browser on A. A switch sends data packets to all
any computer devices on the network, whereas a hub
B. A single network server runs the cloud sends the packets to only the intended re-
services cipients
C. Users have access to unlimited free B. A hub sends data packets to all devices
storage of data on the network whereas a switch allows
the network to connect to the internet
D. There is no danger of sensitive data be-
ing hacked C. A hub sends data packets to all devices
on the network whereas a switch sends
99. In PHP assigning value to a variable may the packets to only the intended recipients
look like this:
A. $ myname = “Vanness” D. none of above
B. myname = “Vanness”
104. is an HTTP method that retrieves
C. $myname = “Vanness” data from the server.
D. var myname = “Vanness” A. GET
NARAYAN CHANGDER
118. Cloud computing is used for: A. A computer that is not connected to a
A. social networking network
B. online data storage B. A computer that is being used as a
server
C. online data storage
C. A computer that does not have any pe-
D. All options
ripherals attached to it
119. is a computer ( Host ) i.e. capable of re- D. A computer that is used by only one
ceiving information person
A. Client
125. What is the main difference between
B. Host client-side and server-side scripting?
C. Server A. Execution on the client
D. none of above B. Execution on the server
120. Which best describes a client? C. Language used
NARAYAN CHANGDER
D. Corrupt e-mail databases through the
B. Limit the privileges of software
use of viruses.
C. Secure your data from corruption
D. Facilitate Internet filtering 16. You suspect a user’s computer is infected
by a virus.What actions should you take?
11. What is spyware?
A. Restart the computer in safe mode
A. Causes adverts to appear on screen.
B. Replace the computer’s hard disk drive
B. Software that deletes your files
C. Disconnect the computer from the net-
C. Slows your pc down. work in connected to business network
D. Collects information from you and D. Run an on demand antivirus scan of all
transfers it across the internet. files
12. Why would a company use Windows 17. How does the sender policy framework
Server Update Services (WSUS) sever? (SPF) aim to reduce spoofed email?
Choose the best two answers
A. It provides a list of IP address ranges
A. to test updates before installing them
for particular domains so senders can be
B. update workstations and servers verified.
C. manage costs B. It includes an XML policy file with each
D. keep all systems with all the same email that confirms the validity of the mes-
patches sage.
C. It lists servers that may legitimately
13. Why is a trojan horse sneaky?
forward mail for a particular domain.
A. It is very inviting
D. It provides an encryption key so that
B. It creeps into your computer authenticity of an email message can be
C. It looks legitimate but really it isn’t validated
D. Because of the romans
18. What does implementing Windows Server
14. Which technology enables you to filter Update Services (WSUS) allow a company
communications between a program and to manage?
the Internet? A. Shared private encryption key updates
A. RADIUS server B. Updates to Group Policy Objects
B. Antivirus software C. Active Directory server replication
C. Software firewall D. Windows updates for workstations
D. BitLocker To Go and servers
19. How can a trojan infect your pc? 24. Physically securing servers prevents:
A. On memory sticks. A. Theft
29. Windows Server Update Services (WSUS) A. Open email attachments if they look in-
is a tool that: teresting
A. Updates data stored in Windows B. Use up-to-date anti-virus software and
servers always download the latest definitions
B. Manages the services that run on a C. Only download files from reputable in-
server ternet sites
C. Updates licensing for Windows D. None of these
servers
NARAYAN CHANGDER
D. Manages updates for Microsoft soft- 32. What is the primary advantage of using
ware Active Directory Integrated Zones?
A. Zone encryption
30. Lisa is trying to get rid of a virus that has
invaded their network. It seems to keep B. Password protection
changing making it difficult to detect. Lisa C. Non-repudiation
is facing what type of malware?
D. Secure replication
A. polymorphic virus
B. cookie 33. What is an example of non-propagating
malicious code?
C. retro virus
A. A back door
D. spyware
B. A hoax
31. Which of the following is BAD advice for
protecting your computer against infec- C. A Trojan horse
tion? D. A worm
7. Peer to peer is a series connection be- 12. Which of the following policies used by
tween PC to PC or PC to Switch without BitTorrent is used to replace peers with
involving a computer faster download peers and also to give
A. workstation new peers who have no pieces to share
the option to download?
B. client
C. waiter A. Optimistic Unchoking
16. Which of the following techniques to con- 21. When comparing P2P apps, it’s important
trol flooding in Gnutella involves starting to pay attention to fees, safety and pri-
with a low TTL and increasing it until the vacy and
searched content is found? A. how many businesses accept the app
A. Random walk
B. which of your friends and family mem-
B. Multiple-walker random walk bers use it
C. State keeping C. Brand name recognition
NARAYAN CHANGDER
D. Expanding ring D. Logo design and colors
17. Which was the 1st large-scale file sharing 22. Another term for unstructured networks is
P2P network?
A. Centralized
A. Gnutella
B. Ad hoc
B. BitTorrent
C. Chaotic
C. Napster
D. Nebula
D. PirateBay
23. Which of the following statements regard-
18. Which of the following best describes the
ing the Kademlia P2P system is false?
BitTorrent structure?
A. If we use 160-bit keys, each node will
A. Centralized / structured
store 160 k-buckets
B. De-centralized / structured
B. The distance between keys is calcu-
C. Centralized / unstructured lated using a bitwise XOR
D. De-centralized / unstructured C. Each key/value pair is stored only in
the node with the closest ID to the key
19. What does the time-to-live (TTL) param-
eter that Gnutella assigns to each search D. Each k-bucket i of node P contains up
message indicate? to k nodes that are at distance [2i, 2i+1)
A. The validity time of the message from P
B. The number of neighboring nodes to 24. Which of the following policies used by Bit-
which the message will be forwarded Torrent is to request all missing sub-pieces
C. The maximum number of nodes that to complete a download from all peers that
can receive the message have them?
D. The maximum number of times the A. Rarest Piece First
message can be forwarded B. End Game Mode
20. Which of these statements is correct when C. Strict Priority
referring to P2P networks? D. Random First Piece
A. All devices are equal
25. What is the Random walk technique to con-
B. There is one central device trol flooding in Gnutella?
C. All devices are equal but some are A. Limit to one the number of neighboring
more equal than others nodes to which each Query message is for-
D. none of above warded
B. Increasing the maximum number of A. The node would locally save the
times a Query message can be forwarded key/value pair passed as a parameter
until the searched content is found
NARAYAN CHANGDER
C. ping 10.10.10.10 D. by texting the recipient to make sure
D. netsh 10.10.10.10 they received the money
40. Botnets are created to
36. How can you get your money back if you
send a P2P payment to the wrong per- A. file share
son? B. DDos
A. Contact a credit bureau C. Spam
B. Contact your P2P app or service and D. identity theft
request to stop the payment E. banking fraud
C. Try to contact the person you sent the
payment to 41. Which of the following policies used by Bit-
Torrent consists of sending pieces to the
D. Contact the police peers with the best upload speed?
37. Which of the following policies used by Bit- A. Optimistic Unchoking
Torrent is to not send chunks to a peer B. Unchoking
when more than a minute has passed with- C. Anti-snubbing
out receiving a chunk from it?
D. Upload Only
A. Optimistic Unchoking
B. Rarest Piece First 42. Which of the following safety and privacy
features is not included in a P2P app or
C. Anti-snubbing service?
D. Upload Only A. Representative call for confirmation of
payments over $100
38. Which of the following policies used by Bit-
Torrent is to download the pieces that are B. Verification of payment amount before
least common among peers first? sending
A. Rarest Piece First C. Opt-out of data sharing
C. Random First Piece 43. What is the name of the capital of Pa-
hang?
D. End Game Mode
A. Week
39. You can protect yourself against sending B. Kuantan
a P2P payment to the wrong person by
using an app or service that asks you C. Bentong
to confirm the payment before it is sent, D. Mersing
NARAYAN CHANGDER
C. 1 Gbps
A. Bloc 0 D. 10 Gbps
B. Bloc 1 58. This P2P network provides security
C. Bloc 2 through Block Chain technology
D. Bloc 3 A. Bitcoin
B. Gnutella
55. Given a P2P Gnutella system consisting of
11 peers organized following a ring topol- C. BitTorrent
ogy, in which each peer has as neighbors D. Napster
its two predecessors and two immediate
successors (that is, 4 neighbors per peer), 59. If a user has 4 PCs, what hardware is
what would be the minimum value of TTL needed to enable a peer to peer network
that ensures that the Query descriptor for to be connected?
a given lookup reaches all peers? A. waiter
A. 1 B. router
B. 2 C. switch
C. 3 D. printer
D. 4 60. IP 10.10.200.225 is IP.
56. The original copyright infringement P2P A. private
network B. public
A. Pirate Bay C. special
B. Napster D. normal
C. Flushing the cache 20. Multiple port numbers are used on the
client side to define
D. Nothing, you can simply “unplug” with
no ill effects A. Multiple simultaneous server connec-
tions
15. Which of the following are the methods
B. Multiple server connections to differ-
available in ServerSocket class?
ent servers
A. accept() C. Multiple receive sockets
NARAYAN CHANGDER
B. close() D. This just isn’t done
C. OutputStream()
21. The socket model was based on:
D. InputStream()
A. Berkeley Software Distribution
16. What happens if you fail to stop the B. Microsoft architecture
stream before closing the socket?
C. Linux architecture
A. Data loss D. Unix programming model
B. Nothing
22. Sockets are different from ports because
C. Logic error
A. They included IP addresses
D. Socket lockup
B. They are in the Application Layer
17. The client in socket programming must C. They use the OSI model
know D. They are just another term for the
A. IP Address of Server same thing
B. Port number of Server 23. TCP socket programming is:
C. Both A and B A. connection-oriented
D. Neither A nor B B. connectionless
18. Which socket function is responsible for C. dependent on the host operating sys-
freeing up the ports used by the socket? tem
D. dependent on the client operating sys-
A. socket open
tem
B. socket send
24. In UDP sockets, the 2-tuple structure con-
C. socket bind
tains
D. socket close A. Server IP and port number
19. Once a server accepts a TCP socket, it is B. Client IP and port number
handed off to: C. Client and server IP numbers
A. Domain controller D. Client and server port numbers
B. Worker object
25. The correct syntax for receive socket is
C. Dynamic cache
A. int status = recv(sockid, & for-
D. Overflow stack eignAddr, addrlen);
NARAYAN CHANGDER
3.1 Introduction
1. Which protocol or service uses UDP for A. Providing network access
a client-to-server communication and TCP B. Tracking individual conversations
for server-to-server communication?
C. Determining the best path to forward
A. HTTP a packet
B. FTP
D. Translating private IP addresses to
C. DNS public IP addresses
D. SMTP
5. A link has a transmission speed of 106
2. What kind of port must be requested from bits/sec. It uses data packets of size
IANA in order to be used with a specific 1000 bytes each. Assume that the ac-
application? knowledgment has negligible transmission
delay, and that its propagation delay is
A. registered port the same as the data propagation delay.
B. private port Also assume that the processing delays at
C. dynamic port nodes are negligible. The eciency of the
stop-and-wait protocol in this setup is ex-
D. source port actly 25%. The value of the oneway prop-
agation delay (in milliseconds) is
3. The combination of an IP address and a
port number is called a A. 4
A. transport address B. 8
B. network address C. 12
C. socket address D. 16
D. none of the above 6. Address used in Application layer of
4. What is a responsibility of transport layer TCP/IP?
protocols? A. specific
11. Consider an instance of TCP’s Additive In- B. to describe the ordered delivery of
crease Multiplicative Decrease (AIMD) al- data between source and destination
gorithm where the window size at the C. to specify the packet type to be used
start of the slow start phase is 1 MSS and by the communications
NARAYAN CHANGDER
packets B. DNS
C. neither of these answers C. HTTP
D. all UDP packets are treated indepen- D. POP3
dently by transport layer
E. VoIP
17. A PC that is communicating with a web
server has a TCP window size of 6, 000 21. Which of the following functionalities must
bytes when sending data and a packet size be implemented by a transport protocol
of 1, 500 bytes. Which byte of informa- over and above the network protocol?
tion will the web server acknowledge af-
A. Recovery from packet losses
ter it has received four packets of data
from the PC? B. Detection of duplicate packets
A. 6001 C. Packet delivery in the correct order
B. 3001 D. End to end connectivity
C. 1501
D. 1500 22. Let the size of congestion window of a TCP
connection be 32 KB when a timeout oc-
18. What is a socket? curs. The round trip time of the connection
is 10 msec and the maximum segment size
A. the combination of the source and des-
used is 1 KB. The time taken (in msec) by
tination IP address and source and desti-
the TCP connection to get back to 32 KB
nation Ethernet address
congestion window is
B. the combination of a source IP ad-
dress and port number or a destination IP A. 200ms
address and port number B. 300ms
C. the combination of the source and des- C. 320ms
tination sequence and acknowledgment
numbers D. 120ms
D. the combination of the source and des-
23. Which protocol is used the most in the
tination sequence numbers and port num-
transport layer
bers
A. UDP
19. To use the services of UDP, we need
socket addresses. B. TCP
A. 4 C. FTP
B. 2 D. PPP
24. What is the value of the receiver window 29. UDP is called a transport protocol.
(rwnd) for host A if the receiver, host B, A. connectionless, reliable
has a buffersize of 5000 bytes and 1000
D. Directing packets towards the destina- 38. deal with the physical aspects of mov-
tion network ing data from one device to another
E. Conducting error detection of the con- A. User Support Layer
tents in frames
B. Link Layer
33. A port address in UDP is bits long
C. Transport Layer
A. 8
D. Network Support Layers
B. 16
NARAYAN CHANGDER
C. 32 39. What does a client do when it has UDP
datagrams to send?
D. none of the above
A. It just sends the datagrams.
34. The acknowledgement number in Selective
Repeat defines the sequence number of the B. It queries the server to see if it is
packet ready to receive data.
A. that is next expected. C. It sends a simplified three-way hand-
B. that is received safe and sound. shake to the server.
52. While opening a TCP connection, the initial 56. The source port address on the UDP user
sequence number is to be derived using a datagram header defines
time-of-day(ToD) clock that keeps running A. the sending computer
even when the host is down. The low or-
der 32 bits of the counter of the ToD clock B. the receiving computer
is to be used for the initial sequence num- C. the process running on the sending
bers. The clock counter increments once computer
per millisecond. The maximum packet life- D. none of the above
time is given to be 64s. Which one of the
NARAYAN CHANGDER
choices given below is closest to the min- 57. Which are the different phases in a connec-
imum permissible rate at which sequence tion oriented service?
numbers used for packets of a connection A. Connection estalishment
can increase?
B. Data transfer
A. 0.015/s
C. Connection tear down
B. 0.064/s
D. connection checking
C. 0.135/s
58. What is assigned by the transport layer to
D. 0.327/s
identify an application or service
53. What happens if part of an FTP message A. Segment
is not delivered to the destination? B. Packet
A. The message is lost because FTP does C. Port
not use a reliable delivery method.
D. IP Address
B. The FTP source host sends a query to
the destination host. 59. Flow control can be implemented through
C. The part of the FTP message that was
lost is re-sent. A. Sockets
D. The entire FTP message is re-sent. B. Ports
C. Interfaces
54. Maximum size of TCP header is
D. Buffers
A. 80 bytes
60. In the sending computer, UDP receives a
B. 60 bytes
data unit from the layer.
C. 20 bytes
A. Application
D. 40 bytes B. Transport
55. UDP needs the address to deliver the C. IP
user datagram to the correct application D. none of the above
process.
61. The maximum window size for data trans-
A. . Port
mission using the selective reject protocol
B. Application with n-bit frame sequence numbers is:
C. Internet A. 2n
D. none of the above B. 2(n−1)
C. port C. SYN
D. machine D. RST
72. Transmission control protocol (TCP) is 76. Which two fields are included in the
A. all of the mentioned TCP header but not in the UDP header?
(Choose two.)
B. uses a three way handshake to estab-
lish a connection A. window
C. receives data from application as a sin- B. checksum
gle stream C. source port
D. connection oriented protocol
D. destination port
NARAYAN CHANGDER
73. Select the correct reponsibility of a trans- E. sequence number
port layer.
A. Identifying frames 77. Which one of the following is a version of
UDP with congestion control?
B. Identifying routing information
C. Segmenting data and reassembling A. datagram congestion control protocol
segments B. stream control transmission protocol
D. none of above C. structured stream transport
74. What important information is added to D. user congestion control protocol
the TCP/IP transport layer header to en-
sure communication and connectivity with 78. The passing of the data and network in-
a remote network device? formation down and back up through the
A. timing and synchronization layers of the receiving device is made pos-
sible by an
B. destination and source port numbers
A. Protocol suite
C. destination and source physical ad-
dresses B. service
D. destination and source logical network C. interface
addresses
D. modularity
75. Consider a TCP connection in a state where
there are no outstanding ACKs. The sender 79. Congestion usually happens when
sends two segments back to back. The A. network load < network capacity
sequence numbers of the first and second
segments are 230 and 290 respectively. B. network load > network capacity
The first segment was lost, but the second C. network load = network capacity
segment was received correctly by the re-
D. network load != network capacity
ceiver. Let X be the amount of data carried
in the first segment (in bytes), and Y be
80. The network layer in OSI is represented in
the ACK number sent by the receiver. The
TCP/IP as
values of X and Y (in that order) are
A. 60 and 290 A. Host-to-Network
81. Electronic mail uses which application layer 87. Which two types of applications are best
protocol suited for UDP? (Choose two.)
NARAYAN CHANGDER
B. UDP
C. ICMP 98. UDP uses to handle incoming user data-
grams that go to different processes on
D. ARP the same host.
93. Which transport layer protocol ensures re- A. flow control
liable same-order delivery? B. Multiplexing
A. ICMP C. Demultiplexing
B. IP D. none of the above
C. TCP 99. Which of the following statements are
D. UDP TRUE? (S1) TCP handles both congestion
and flow control (S2) UDP handles conges-
94. Which transport layer protocol statement tion but not flow control (S3) Fast retrans-
is true? mit deals with congestion but not flow con-
A. TCP is faster than UDP. trol (S4) Slow start mechanism deals with
both congestion and flow control
B. TCP has fewer fields than UDP.
A. S1, S2 and S3 only
C. UDP provides reliability.
B. S1 and S3 only
D. UDP is a best-effort delivery protocol.
C. S3 and S4 only
95. Which of the following functions does UDP D. S1, S3 and S4 only
perform?
100. The transport layer address is called
A. process-to-process communication
A. MAC address
B. host-to-host communication
B. IP address
C. end-to-end reliable data delivery
C. Port number
D. none of the above D. Service number
96. What is the maximum size of data that the 101. Transport layer aggregates data from dif-
application layer can pass on to the TCP ferent applications into a single stream be-
layer below? fore passing it to
A. Any size A. physical layer
B. 216 bytes-size of TCP header B. network layer
C. 216 bytes C. data link layer
D. 1500 D. application layer
102. Four way Association is established in 107. Which layer is responsible for establish-
ing a temporary communication session be-
tween the source and destination host ap-
NARAYAN CHANGDER
D. Acknowledgment Number
D. 80 E. Checksum
113. In the OSI model, what layer is the trans-
118. Which of the following is NOT true
port layer
about User Datagram Protocol in transport
A. Layer 7 layer?
B. Layer 1 A. Works well in unidirectional commu-
C. Layer 3 nication, suitable for broadcast informa-
tion.
D. Layer 4
B. It does three way handshake before
114. In Stop and Wait protocol both send and sending datagrams
receive window size is
C. It provides datagrams, suitable for
A. N modeling other protocols such as in IP tun-
B. 1 neling or Remote Procedure Call and the
C. 2n Network File System
121. After reaching congestion threshold, the loss (S4) The server moves LISTEN → SYN
data packets are increased RCVD → ESTABLISHED in the state
machine on no packet loss.
C. Linearly B. S1 and S4
NARAYAN CHANGDER
131. The transport layer protocols used for TCP connections are message streams.
real time multimedia, file transfer, DNS
and email, respectively are: A. Only I is correct
A. TCP, UDP, UDP and TCP B. Only I and II are correct
B. UDP, TCP, TCP and UDP C. Only I and III are correct
C. UDP, TCP, UDP and TCP D. All of the Above
D. TCP, UDP, TCP and UDP 137. NAK is a acknowledgement
132. What information is used by TCP to re- A. Positive
assemble and reorder received segments? B. Negative
A. port numbers C. Neutral
B. sequence numbers
D. None of the above
C. acknowledgment numbers
138. UDP does not add anything to the ser-
D. fragment numbers
vices of IP except for providing com-
133. Which two traffic types require delay munication.
sensitive delivery? (Choose two.) A. Node-to-node
A. Email B. Process-to-process
B. Web C. Host-to-host
C. FTP D. none of the above
D. Voice
139. UDP packets are called
E. Video
A. user datagrams
134. Name the addressing used in host-to- B. Segments
network in TCP/IP model.
C. Frames
A. port
D. none of the above
B. physical
C. logical 140. Loss of data packet is indicated by
D. specific A. Repeated acknowledgements
B. No acknowledgement
135. What is the meaning of bandwidth in a
network? C. Message indicating loss of packet
A. Class of IP used in the network D. None of the above
142. TCP has which of the following character- 147. What type of applications are best suited
istics for using UDP?
A. connection establishment A. Applications that are sensitive to delay
B. all of these answers B. Applications that need reliable deliv-
ery
C. congestion control
C. Applications that require retransmis-
D. flow control sion of lost segments
143. Which field in the TCP header indicates D. Applications that are sensitive to
the status of the three-way handshake packet loss
process? 148. Peer to Peer file sharing is
A. window A. all of the mentioned
B. reserved B. scalable
C. checksum C. fault tolerant
D. control bits D. less secure
144. layer links the two subgroups in 149. Select the correct method used to setup a
TCP/IP and ensures that what the lower virtual circuit
layers have transmitted is in a form that A. SYN →<-SYN/ACKAck→
the upper layers can use
B. SYN →<-SYNAck→
A. Application
C. SYN →<-ACKAck→
B. Transport
D. SYN →<-ACKSyN/Ack→
C. physical, data-link and network
150. Transport layer may be responsible for
D. session flow and error Control, like the
145. What is the complete range of TCP and A. Physical layer
UDP well-known ports? B. Data link layer
A. 0 to 255 C. Network layer
B. 0 to 1023 D. Application layer
151. In the sending computer, UDP sends a 156. Which of the following can be software?
data unit to the layer.
A. firewalls
A. Application
B. modems
B. Transport
C. routers
C. IP
D. none of the above D. gateway
152. Which factor determines TCP window 157. Which of the following mechanism over-
NARAYAN CHANGDER
size? come buffer overrun?
A. the amount of data to be transmitted A. Error Control
B. the number of services included in the
B. Congestion control
TCP segment
C. the amount of data the destination can C. Stream control
process at one time D. Flow Control
D. the amount of data the source is capa-
ble of sending at one time 158. Consider the following statements.I.
TCP connections are full duplex.II. TCP
153. The ports ranging from 49, 152 to 65, has no option for selective acknowledg-
533 can be used as temporary or private mentIII. TCP connections are message
port numbers. They are called the streams.Which of them is/are correct?
ports.
A. I
A. Well-known
B. I and II
B. Registered
C. Dynamic C. I, II, and III
D. none of the above D. II
154. Transport layer aggregates data from dif- 159. What does UDP stand for
ferent applications into a single stream be-
fore passing it to Network Layer. This pro- A. User Datagram Protocol
cess is called B. User Defined Primitive
A. Multiplexing C. User Dedicated Program
B. DeMultiplexing
D. User Datagram Piece
C. Connection
D. Connectionless 160. What does a protocol define
155. Which Flag bit in TCP header must be set A. protocol defines when data is commu-
when a TCP entity wants to terminate a nicated
connection? B. all of these answers
A. RST
C. protocol defines what data is commu-
B. ACK nicated
C. FIN D. protocol defines how data is communi-
D. SYN cated
161. The local host and the remote host are de- 166. The number of layers the original TCP/IP
fined using IP addresses. To define the pro- protocol suite .
cesses, we need second identifiers called
162. In TCP numbering always start with A. A client requests a TCP connect to
a server, but doesn’t respond to the
A. 1 always server’s syn-ack.
B. 0 always B. A server ignores a client’s connection
C. random generated number attempt.
D. last connection last sequence no C. A client connects to the same server
multiple times.
163. Which number or set of numbers repre-
sents a socket? D. A client uses telnet to connect to a
server.
A. 10.1.1.15
B. 01-23-45-67-89-AB 168. Which of these is the most correct defini-
tion of a Transport layer?
C. 21
D. 192.168.1.1:80 A. The Transport Layer in the Open Sys-
tem Interconnection (OSI) model is faster
164. What is an advantage of UDP over TCP? for end-to-end transmission over a net-
work.
A. UDP communication is more reliable.
B. UDP communication requires less B. The Transport Layer in the Open Sys-
overhead. tem Interconnection (OSI) model is re-
sponsible for end-to-end delivery over a
C. UDP reorders segments that are re- network.
ceived out of order.
C. The Transport Layer in the Open Sys-
D. UDP acknowledges received data. tem Interconnection (OSI) model is faster
165. How does a networked server manage for end-to-end transmission over a net-
requests from multiple clients for different work, and which also simplifies the trans-
services? mission of information.
170. Ephemeral Ports-also known as? 173. Which of the following control is enabled
A. Well-known in UDP?
NARAYAN CHANGDER
lishing a temporary communication session 174. Which three statements characterize
between two applications and ensuring UDP? (Choose three.)
that transmitted data can be reassembled A. UDP provides basic connectionless
in proper sequence? transport layer functions.
A. Session B. UDP provides connection-oriented,
B. Transport fast transport of data at Layer 3.
C. Data link C. UDP relies on application layer proto-
cols for error detection.
D. network
D. UDP is a low overhead protocol that
172. Let the size of congestion window of a does not provide sequencing or flow con-
TCP connection be 32 KB when a timeout trol mechanisms.
occurs. The round trip time of the connec- E. UDP relies on IP for error detection
tion is 100 msec and the maximum seg- and recovery.
ment size used is 2 KB. The time taken (in
msec) by the TCP connection to get back to 175. Which are the different phases in a con-
32 KB congestion window is nection less service?
A. 1100 to 1300 A. Connection estalishment
B. 800 to 1000 B. Data transfer
C. 1400 to 1600 C. Connection tear down
D. 1500 to 1700 D. connection checking
NARAYAN CHANGDER
D. Hang them upside down for 3 hours A. To send information across the inter-
net in packets
3. Which of the following protocols is used by
email servers to exchange messages with B. To ensure that information is sent to
oneanother? the correct computer
A. POP3 C. To send mail across the internet
B. IMAP D. To transmit webpages across the inter-
net
C. SMTP
D. HTTP 9. What is the role of the application layer of
the TCP/IP model
4. Which of these does NOT happen during
A. The Application Layer of the TCP/IP
the application layer
Model consists of various protocols that
A. Data is created perform all the functions of the OSI
B. Protocols are added model’s Application, Presentation and
Session layers. This includes interaction
C. Data is split into packets with the application, data translation and
D. none of above encoding, dialogue control and communi-
cation coordination between systems.
5. Which protocol would you use to transfer
hypertext? B. The application layer of the TCP/IP
model ensures that data gets sent to the
A. FTP correct computer, across a network, send-
B. SMTP ing back acknowledgements when data is
not sent.
C. POP3
C. The Application Layer is the layer in the
D. HTTP
TCP/IP model at which data is transmit-
6. what is the subnet mask of ted and received across the physical net-
192.168.1.2/24 work.
A. 255.255.255.0 D. The Application layer in the TCP/IP ref-
erence model is responsible for transfer-
B. 255.255.0.0
ring data between the source and desti-
C. 255.0.0.0 nation computers. The Internet layer ac-
D. 192.168.1.2 cepts data from the Transport layer and
passes the data to the Network Interface
7. What is the FIRST thing the destination layer. The following are the functions
does at the network layer with a packet of the Internet layer:Transmitting data to
it receives? the Network Interface layer. Routing the
B. Transport, Internet, Physical, Applica- B. It finds the most efficient route for
tion each packet
C. Application, Internet, Physical, Trans- C. Packets are put back together at the
port receivers device
NARAYAN CHANGDER
B. Internet Control Message Proto-
col(ICMP)
26. Encryption takes place at what layer?
C. Address Resolution Protocol(ARP)
A. Application
D. Bootstrap Protocol(BOOTP)
B. Session
21. Which of the TCP/IP model layers has
C. Data Link
a PDU as a segment, but is responsible
for breaking down the message into pack- D. Presentation
ets?
E. Transport
A. Network
27. Why were the Data Link & Physical layers
B. Application
divided into two separate layers in the cur-
C. Transport rent TCP/IP model?
D. Internet A. Because the number of protocols grew
too large for the link layer to handle it by
22. Actual data may consist of itself
A. part of a streamed video
B. Because networks use different types
B. part of an email of transmission media (ethernet wire,
C. part of a web page fiber optic cable, and radio signals) to
transmit bits
D. All of these answers
C. Because the original TCP/IP model
23. FTP stands for transfer protocol. was too complicated for many typical uses
A. file
D. none of above
B. frame
C. folder 28. An IP address of a computer directly con-
D. none of above necting to the Internet should be(1) at
least 32 bits long(2) assigned to the net-
24. The character string TCP sends to secure work interface card of the computer by the
connection manufacturer(3) unique
A. number A. only
B. response B. only
C. checksum C. and (3) only
D. sequence number D. and (2) only
29. OSI model stands for? 34. Which is not a layer in the TCP/IP model?
A. Open System Interconnection Model A. Application
B. Domain Name can remain unchanged 36. Which protocol is used to send packets
even if the host computer is moved to a A. IP
different network.
B. FTP
C. Domain Name is normally easier to re-
C. SMTP
member.
D. TCP
D. Domain Name supports a faster con-
nection to the requested host computer. 37. Which layer does TCP operate on
31. A port address in TCP/IP is bits long. A. Application
A. 32 B. Transport
B. 48 C. Network
C. 16 D. Link
C. Less computational power is required 45. Which is NOT one of the application layer
of web servers. protocols?
D. More web content can be surfed. A. HTTP
B. FTP
40. Addressing used in transport layer of
TCP/IP. C. SMTP
A. specific D. IP
NARAYAN CHANGDER
B. port 46. is the protocol that hides the underly-
C. logical ing physical network by creating a virtual
network view.
D. physical
A. Internet Protocol(IP)
41. Data packets are divided at the layer B. Internet Control Message Proto-
of the TCP/IP protocol. col(ICMP)
A. Application C. Address Resolution Protocol(ARP)
B. Transport D. Bootstrap Protocol(BOOTP)
C. Internet
47. What term refers to addresses that orga-
D. Physical nizations use for nodes requiring IP con-
nectivity within enterprise networks, but
42. What is name of the protocol that matches do not require external connections to the
domain names to IP addresses? global Internet?
A. SMTP A. Private addresses
B. TCP B. Public address
C. IP C. Dynamic Host Configuration Protocol
D. DNS (DHCP) addresses
D. Dynamic addresses
43. The IP Address and port number form
what is called a 48. What is Pneumonoultramicroscopicsilico-
A. Socket volcaniosis
B. So the router can speak to WiFi 49. Which layer handles the formatting of ap-
C. So the Internet knows where to send plication data so that it will be readable by
information the destination system?
52. Which network hardware is used to for- A. Transmission Control Protocol (TCP)
ward data packets between networks? B. Both options are protocols used at the
A. Switch Network layer
NARAYAN CHANGDER
DHCP server is available?
pings
A. Automatic private IP addressing
(APIPA) A. NAT
C. 3 B. Computers in a circle
D. 4 C. Clients receiving data from servers
79. IP is implemented at which OSI model 84. SMTP works at the layer of the
layer? TCP/IP model.
A. Transport A. physical/Network interface
B. Data Link B. transport
C. Logical Link Control
C. application
D. Session
D. internet
E. Network
NARAYAN CHANGDER
80. The first SYN message in the three-way 85. The protocol that operates at the Network
handshake layer of the OSI model to manage multicas-
ting
A. initial sequence number
B. check sum A. Internet Group Management Protocol
C. IP B. 111
D. BOOTP C. 100
82. Which statement is true about the TCP/IP D. 11111111
and OSI models?
87. A logical division of a computer network,
A. The TCP/IP transport layer and OSI
in which all nodes can reach each other by
Layer 4 provide similar services and func-
broadcast at the data link layer.
tions.
B. The first three OSI layers describe gen- A. multicast domain
eral services that are also provided by the B. ARP table
TCP/IP internet layer.
C. broadcast domain
C. The TCP/IP network access layer has
similar functions to the OSI network layer. D. lookup tables
D. The OSI Layer 7 and the TCP/IP appli-
88. Bits are packaged into frames at which
cation layer provide identical functions.
layer of the OSI model?
83. The three step process TCP uses to estab- A. Data Link
lish connectivity
B. Physical
A. check
B. control C. Application
C. three-way handshake D. Transport
D. checksum E. Presentation
89. What is the Transport layer of the TCP/IP 92. Mr. Chan wants to register a domain
model responsible for? name by using his name, ‘Chan Tai Man’.
Which of the following domain names is
C. middle B. packet
C. datagram
D. zero
D. frames
91. What is the combination of the data and
96. In a LAN, an ethernet connection repre-
TCP header called?
sents which layer of the TCP/IP model?
A. frame A. Application
B. segment B. Transport
C. packet C. Internet
D. none of above D. Physical
NARAYAN CHANGDER
98. What advantage does the IPv6 standard
C. SMTP and POP3
have over the Internet Protocol version 4
(IPv4) standard? D. MTP and ETP
A. It vastly increases the available pool 103. Which layer 4 protocol is used for a Tel-
of IP addresses. net connection?
B. It enables greater data transmission A. IP
speeds.
B. TCP/IP
C. It supports the IPsec security feature,
which is unavailable in IPv4. C. TCP
D. It allows devices to self-assign an IP D. UDP
address from a server.
104. To traverse more than one LAN seg-
99. Amy owns a domain name, ‘amy- ment and more than one type of network
comp.com’. Which of the following URLs through a router.
is not owned by Amy? A. Travel
A. http://www.AmyComp.com/index.html B. intranetwork
C. internetwork
B. http://www.amycomp.com.hk/main.htm
D. protocol
107. Which networking technology is currently 112. Which of the TCP/IP model layers is re-
recognized as the standard for computer sponsible for breaking down the message
networking? into packets?
118. Which of these are mail protocols? 124. In the current TCP/IP model, the Applica-
A. SMTP and POP tion, Presentation, & Session layers from
the OSI model are combined into which
B. TCP and FTP layer?
C. FTP and SMTP
A. Data Link
D. POP and IP
B. Physical
119. TCP is a(n) transport protocol. C. Transport
NARAYAN CHANGDER
A. Protocol delivery
D. Application
B. Reliable
E. Network
C. Best-effort delivery
D. Effortless delivery 125. What does LLC stand for?
A. Limited liability company
120. The number of layers in the TCP/IP pro-
tocol suite . B. Logical link control
A. Four C. LL Cool J
B. Five D. Lightly linked cord
C. Six E. Life line cable
D. Seven
126. ‘www.edb.gov.hk’ is translated into
121. A dynamic IP address is issued by a ‘210.245.204.96’ for web browsing.
A. DHCP server Which of the following provides this kind
of translation service?
B. FTP server
A. Domain Name Server
C. DNS server
B. Operating system
D. Gandalf the Grey
C. Browser
122. Which of the following are transport
layer protocols? D. Switch
A. TCP and UDP 127. What is the role of the datalink layer
B. IP A. To interrupt the flow of data
C. FTAM B. To sniff all the packages
D. IP and TFTP
C. the main processes of the data link
123. Ms Wong wants to register a new web layer are to deal with transmission er-
site for her company. What should she do? rors, regulate the flow of data, and pro-
(1) Choose a domain name that is easy to vide a well-defined interface to the net-
remember.(2) Choose an IP address that is work layer.
easy to remember.(3) Set up a file server. D. The data link layer links the other lay-
A. only ers of the OSI model together, so that the
B. only end to end devices are able to communi-
cate with each other. More so to ensure
C. and (2) only that network errors do not occur, with
D. and (3) only your internet line
B. Transmission Control Protocol (TCP) 136. How many layers are there in the TCP/IP
C. Both are transport layer protocols model
D. none of above A. 7
B. 4
132. TCP and IP are mainly used for
C. 42
A. network communication
D. 10123
B. web authoring
C. system integration 137. How many layers are in the TCP/IP
model?
D. virus scan
A. 4
133. What is the primary purpose of a Domain
B. 7
Name System (DNS) server?
A. Translating names into numeric IP ad- C. 5
dresses D. 6
138. What term refers specifically to an IP ad- 143. Which 2 layers in the OSI model corre-
dress that has been manually configured spond to only one layer each in the TCP/IP
on a device by a network technician? model?
A. A static address A. Transport
B. A dynamic address B. Network
C. A public address C. Session
D. A network address D. Physical
NARAYAN CHANGDER
E. Data Link
139. Select statement which is TRUE about the
TCP/IP model and OSI models. 144. What is the native protocol of the Inter-
A. TCP/IP transport layer and OSI layer net, which is required for Internet connec-
4 provide similar services and functions. tivity?
A. Transmission Control Proto-
B. TCP/IP network access layer has sim-
col/Internet Protocol (TCP/IP)
ilar functions to the OSI network layer.
B. User Datagram Protocol (UDP)
C. OSI layer 7 and the TCP/IP application
layer provide identical functions. C. Dynamic Host Configuration Protocol
(DHCP)
D. The first 3 OSI layers describe gen-
eral services that are also provided by the D. Internet Protocol version 6 (IPv6)
TCP/IP internet layer. 145. Which of the following statements about
140. How many layers are OSI model and Internet Protocol version 6 (IPv6) is
TCP/IP model? false?
A. IPv6 is compatible with Internet Proto-
A. 4 layers, 7 layers
col version 4 (IPv4) and is widely used in
B. 7 layers, 4 layers production networks.
C. 7 layers both B. IPv6 has simplified address headers
D. 4 layers both and supports hierarchical addressing.
C. IPv6 supports time-sensitive network
141. Which of these are true about stack lay-
traffic and a new structure for unicast ad-
ers (choose one)
dressing.
A. They are self contained D. IPv6 greatly increases the available
B. It is an example of decomposition pool of IP addresses.
C. It prevents designers creating their 146. What are sets of clearly defined rules,
own models regulations, standards, and procedures
D. All of these answers that enable hardware and software de-
velopers to make devices and applica-
142. What is an IP address? tions that function properly at a particular
A. A way of sending information layer?
B. A way of indicating the location of a de- A. Protocol
vice B. TCP/IP
C. A way of deleting viruses C. Networks
D. A secure communication method. D. Interconnection
147. How much data can a typical frame con- C. network layer
tain? D. transport layer.
NARAYAN CHANGDER
4.1 Introduction
1. Routers operate at:(Choose two.) 4. The network layer is concerned with
of data.
A. Physical layer of the OSI model
A. bits
B. Application layer of the OSI model
B. frames
C. Layer 3 of the OSI model
C. packets
D. Network layer of the OSI model
D. bytes
E. Layer 5 of the OSI model
5. What is the command to display host rout-
2. The physical layer of the receiving de- ing tables?
vice passes bits up to which higher level
layer? A. show ip route
A. application B. netstat-r
C. arp-a
B. presentation
D. show run
C. network
D. data link 6. Which protocol gives a full route table up-
date every 30 seconds?
3. Which of the following is the widely used A. IEGRP
medium for networking due to relatively
low cost, ease of use, and fast network- B. RIP
ing speeds? C. ICMP
A. Unshielded Twisted-Pair (UTP) D. IP
B. Fiber-optic
7. Which statement about host forwarding
C. Coaxial Cable decisions is true?
D. Wireless A. A host cannot ping itself.
16. What is the encapsulation unit for Layer 22. IP media independent process allows for
3? transmission over what types of media?
A. segment A. copper
B. data B. fiber optics
C. packets C. wireless
D. frames
D. copper serial
NARAYAN CHANGDER
17. The network layer responds to request
from which layer? 23. designed for an Internet work environ-
ment with small wireless cells.
A. Transport layer
A. MMP
B. Data layer
B. RMDP
C. Application layer
D. Session layer C. RM2
D. Mobicast
18. Discarding policy is
A. Error control policy 24. One of the header fields in an IP data-
B. Closed loop congestion control policy gram is the Time to Live(TTL)field. Which
of the following statements best explains
C. Open loop congestion control policy the need for this field?
D. None of the above A. It can be used to prioritize packets
19. In closed-loop congestion control, policies B. It can be used to reduce delays
are applied to
C. It can be used to optimize throughput
A. Remove after congestion occurs
D. It can be used to prevent packet loop-
B. Remove after sometime ing
C. Prevent before congestion occurs
D. Prevent before sending packets 25. The network layer issues request to which
layer?
20. In virtual circuit network each packet con- A. Transport layer
tains
B. Data layer
A. only source address
C. Application layer
B. full source and destination address
C. all 0 D. Session layer
27. During the boot process, where will the 32. How do you configure the default gateway
router bootstrap program look for the IOS of a switch?
image by default?
31. What type of connectors do router have? 37. The purpose of the Transmission layer is
A. Serial Interface A. Prepares or presents the data (email,
file, message) for /from transmission-
B. Ethernet Interface including applying encryption/decryption
C. Mini USB Interface B. Ensures reliable transmission of data
D. Console/Aux Interface across the network.
NARAYAN CHANGDER
B. 48 bits 43. Why is IPv6 preferred over IPv4?
C. 64 bits A. Better performance in terms of subnet-
D. 128 bits ting
B. Increased address space
39. Routers contain a internet routing table.
What is the purpose of the routing table? C. Support higher transmission speed
A. Forward packets based on routers D. Suitable for both wired and wireless
availability networks
B. used by router to pass along frames to 44. GSM stands for
next hop
A. global system for mobile communica-
C. used by routers to pass bits to next tion
switch
B. General standard for mobile
D. used by routers to make best path de-
terminations C. global standard for mobile communica-
tion
40. Which IPv4 header field identifies the up-
D. none of these
per layer protocol carried in the packet?
A. Protocol 45. When transporting data from real-time ap-
plications, such as streaming audio and
B. Identification
video, which field in the IPv6 header can
C. Version be used to inform the routers and switches
D. Differentiated Services to maintain the same path for the packets
in the same conversation?
41. Which IPv4 address can be used to test the
TCP/IP protocol stack on a host? A. Next Header
C. connectionful, best effort, media inde- 51. What are the purposes of the Network
pendent header? Select more than 1 answer.
56. Components in Header of a frame: 61. What are the features of a default gate-
way? Select more than 1 answer.
A. Header, data packet and trailer
A. It has an IP address in the same range
B. Packet, head, trailer as other hosts in the local network
C. Start of frame, address, type/length B. It accepts data into the local network
D. none of above and forwarding data out of the local net-
work
57. The Effect of performance in congestion
NARAYAN CHANGDER
C. It can route to the other networks
area is
D. It cannot be routed to another router
A. The capacity increases the delay de-
creases 62. Which IPv4 address can a host use to ping
the loopback interface?
B. The capacity increases the delay in-
creases A. 126.0.0.1
B. 127.0.0.0
C. The capacity increases the delay is
same C. 126.0.0.0
D. Non of the above D. 127.0.0.1
B. line vty 0 15password 71. Select all protocols involved in the applica-
C. line vty 1 5encrypt tion layer
68. In which switching method can packets be 73. Remote networks are?
routed around congestion? A. hosts that do not share the same net-
A. Packet switching work address
B. Circuit switching B. hosts that share the same network ad-
C. Public switched networks dress
70. The computation of the shortest path in 75. What model is used to describe how data
OSPF is usually done by communication occurs between hosts?
A. Bellman-ford algorithm A. server-centric model
B. Routing information protocol B. workgroup model
C. Dijkstra’s algorithm C. peer-to-peer model
D. Distance vector routing D. OSI reference model
NARAYAN CHANGDER
C. Virtual Circuit
D. Packet switched B. TCP and UDP
C. UDP, but not TCP
77. Which statement correctly describes frame
encoding? D. Neither TCP nor UDP
A. It generates the electrical, optical, or 82. MANET stand for
wireless signals that represent the binary A. Multi area network
numbers of the frame.
B. multi adhoc network
B. It uses the characteristic of one wave
to modify another wave. C. mobile area network
D. mobile adhoc network
C. It transmits data signals along with a
clock signal which occurs at evenly spaced 83. What stores Bootup information that pro-
time durations. vides the startup instructions?
D. It converts bits into a predefined code A. RAM
in order to provide a predictable pattern
B. ROM
to help distinguish data bits from control
bits. C. COM
D. root
78. what command allows you to enter into
global configuration mode? 84. Two computers C1 and C2 are con-
A. con t figured as follows. C1 has IP ad-
dress 203.197.2.53 and netmask
B. configure terminal 255.255.128.0. C2 has IP ad-
C. config t dress 203.197.75.201 and netmask
D. terminal config 255.255.192.0. which one of the fol-
lowing statements is true?
79. The field determines the lifetime of A. C1 and C2 both assume they are on the
IPv6 datagram same network
A. Hop limit B. C2 assumes C1 is on same network,
B. TTL but C1 assumes C2 is on a different net-
work
C. Next header
C. C1 assumes C2 is on same network,
D. Type of traffic but C2 assumes C1 is on a different net-
80. In version field of IPv4 header, when ma- work
chine is using some other version of IPv4 D. C1 and C2 both assume they are on dif-
then datagram is ferent networks.
87. How does the network layer use the MTU C. The loss of wireless signal over exces-
value? sive distance from the access point.
A. The network layer depends on the D. The weakening of the network signal
higher level layers to determine the MTU. over long cable lengths.
B. The network layer depends on the data 91. What PDU is received by the physical layer
link layer to set the MTU, and adjusts the for encoding and transmission?
speed of transmission to accommodate it. A. Frame
C. To increase speed of delivery, the net-
B. Segment
work layer ignores the MTU.
C. Packet
D. The MTU is passed to the network
layer by the data link layer. D. Data
88. In IPv4, only thing encapsulated in a frame 92. Which one of the following algorithm is not
is used for congestion control?
A. Unit A. traffic aware routing
B. Datagram B. admission control
C. Adresses C. load shedding
D. Data Frame D. routing information protocol
89. A n Internet Service Provider (ISP) 93. Which of the following is a characteristics
has the following chunk of CIDR- of IP?
based IP addresses available with A. Ensure reliable end to end data trans-
it:245.248.128.0/20. The ISP wants to mission
give half of this chunk of addresses to
Organization A, and a quarter to Orga- B. Collisions are avoided in different
nization B, while retaining the remaining transmission media
with itself. Which of the following is a C. Sender doesn’t know if the receiver is
valid allocation of addresses to A and B? listening or the message arrived on time
NARAYAN CHANGDER
A. L-directly connected local interface IP
C. Layer 3
address
D. Layer 4
B. C-directly connected network
95. The services that is provided by the data C. S-static route was manually config-
link layer is ured by administrator
A. frame D. O-OETI
B. framing E. E-EIGRP
C. framed 101. IPv6 was developed by
D. none of above A. IEEE
B. ICANN
96. DHCP is based on a model
C. IETF
A. peer to peer
D. NCS
B. client/server
102. A 4 byte IP address consists of
C. one to many
A. Only Network address
D. none of these
B. Both Network and host address
97. In IPv4, service type of service in header C. Only MAC address
field, first 3 bits are called
D. Only Host Address
A. Type of service
103. Network layer receives segment from
B. Code bits transport layer and the resulting PDU is
C. Sync bits called
D. Precedence bits A. Packet
B. Segment
98. Length of IPv6 address
C. Data
A. 48 bit
D. Frame
B. 32 bit
104. The command “show ip interface brief”
C. 64 bit is used to look at which layer?
D. 128 bit A. Layer 2
99. Which processes are adopted by the Net- B. Layer 3
work layer? Select more than 1 answer. C. Layer 4
A. Addressing end devices D. Layer 7
D. 256 B. D
C. R
109. The network between 2 nodes is
D. C
A. cable
B. link 115. If a class B network on the Internet has
a subnet mask of 255.255.248.0, what
C. physical layer
is the maximum number of hosts per sub-
D. none of above net?
110. How many bits are in an ipv4 address? A. 1022
A. 16 B. 1023
B. 32 C. 2046
C. 64 D. 2047
D. 128 116. Which of the following is false with re-
111. The subnet mask for a particular network spect to the features of OSPF?
is 255.255.31.0. Which of the following A. Support for fixed-length subnetting by
pairs of IP addresses could belong to this including the subnet mask in the routing
network? message
B. More flexible link cost than can range 121. Which level is the network layer in the
from 1 to 65535 OSI model?
C. Use of designated router A. 3
D. Distribution of traffic over multiple B. 4
paths that have equal cost to the destina- C. 2
tion
D. 5
117. What statement describes an advantage
NARAYAN CHANGDER
that the IPv6 simplified header offers over 122. Which layer in the OSI model includes the
IPv4? cable and network adapters?
B. Through the LAN Connection 132. When a router receives a packet, what
C. The Console Port information must be examined in order for
the packet to be forwarded to a remote
NARAYAN CHANGDER
137. The size of an IP address in IPv6 is A. Header Length
B. Time-to-Live
A. 4 bytes
C. Fragment Offset
B. 128 bits
D. Differentiated Services
C. 8 bytes
D. 100 bits 142. ICANN:Internet Corporation for Assigned
Names and Numbers task:
138. What are the three major phases to the
A. manages DNS
bootup process?
B. allocates addresses
A. Perform the POST and load the boot-
strap program. C. both answer
B. Locate and load the Cisco IOS soft- D. none of above
ware.
143. What is a basic characteristic of the IP
C. Locate and load the startup configura- protocol?
tion file or enter setup mode.
A. connectionless
D. Allocate resources from the BIOS.
B. media dependent
E. Locate the MAC and ARP tables.
C. user data segmentation
139. Which statement correctly describes sig- D. reliable end-to-end delivery
naling?
144. CoAP provides which of the following re-
A. It uses the characteristic of one wave
quirements?
to modify another wave.
A. Multicast support and simplicity
B. It converts bits into a predefined code
in order to provide a predictable pattern B. Low overhead and multicast support
to help distinguish data bits from control C. Simplicity and low overhead
bits.
D. Multicast support, Low over head, and
C. It transmits data signals along with a simplicity
clock signal which occurs at evenly spaced
time durations. 145. IPv4 Addressing contain?
D. It converts the frame binary numbers A. 32 bits
into electrical, optical, or wireless signals. B. 4 octets separated by dotted decimals
140. ICMP stands for C. 48 Bits
A. Internet Coordinate Message Protocol D. 128 Bits
148. Which layer of the OSI model is used 154. Which of the following are characteristics
to create a connection so that a host can of IP Protocol? Select more than 1 an-
transfer files? swer.
A. Physical A. Connectionless-no connection is estab-
lished before sending data packets
B. Session
B. Best effort delivery-does not guaran-
C. Application tee packet delivery
D. Presentation C. Stateful-information about connection
is retained for future use
149. IP is connectionless.
D. Media independent-operates indepen-
A. true dently of the medium carrying the data
B. false
155. What are advantages of dividing net-
C. Time oriented conection work transmission into layers? Select one
D. Connection oriented answer only
A. Network communication components
150. The data link layer is located between: are standardised which helps to ensure
A. application layer and transport layer that different types of hardware and soft-
B. transport layer and network layer ware are able to communicate.
B. Through separating the overall net-
C. network layer and physical layer
work communication processes it makes
D. none of above troubleshooting easier should an error oc-
cur.
151. IPSec is designed to provide security at
C. To ensure that if changes are made in
A. Transport Layer one layer they do not affect any other lay-
B. Network Layer ers
NARAYAN CHANGDER
A. Unicasting B. Local host-which is another host in the
B. Multicasting same network
C. Broadcasting C. Remote host-which is another host in
D. None of the above a different network
D. Only other hosts
157. IP stands for
A. Internet packet 162. Which key combination allows a user to
abort setup mode?
B. information protocol
A. Ctrl-C
C. internet protocol
B. Ctrl-Z
D. information packet
C. Ctrl-R
158. What command allows you to secure user D. Ctrl-Shift-6
EXEC mod
A. line console 0grep 163. Which command will help you provide le-
gal notification?
B. line console 0password
A. terminal banner
C. line console 0encrypt
B. terminal router
D. line console 0secure
C. banner motd
159. What’s the primary purpose of a router?
D. terminal motd
A. Deliver packets to PC’s on local seg-
ments. 164. which one is the loopback ip address?
B. It controls the data flow of Layer 2 ad- A. 169.254.0.1
dresses. B. 0.0.0.0
C. It provides Layer 2 address data seg- C. 127.0.0.1
mentation.
D. 128.0.0.1
D. Deliver packets to different networks
using the best available path. 165. In IPv4 protocol, each datagram is han-
dled
160. What is the purpose of the OSI physical
layer? A. independently
166. The data link layer of sending node needs B. Ensures reliable transmission of data
to across the network.
NARAYAN CHANGDER
177. Which of the following is NOT true with
respect to a transparent bridge and a B. Sequence Number
router? C. Acknowledgment Number
A. Both bridge and router selectively for- D. Differentiated Services
ward data packets
B. A bridge uses IP addresses while a 182. What is TRUE about the router? Select
router uses MAC addresses more than 1 answer
D. Hosts will use the default gateway 190. TCP/IP and IPX/SPX are known as
when sending packets to remote net- A. IP address
works.
195. Compared to IPv4 Header, IPv6 Headers 200. A computer can access devices on the
are? same network but cannot access devices
on other networks. What is the probable
A. has less field thus allowing for more
cause of this problem?
efficient packet handling
B. contains more fields and has more A. The cable is not connected properly to
overhead the NIC.
C. same number of fields and does the B. The computer has an invalid IP ad-
dress.
NARAYAN CHANGDER
same operations as IPv4
D. none of the above C. The computer has an incorrect subnet
mask.
196. ICMP is primarily used for D. The computer has an invalid default
A. error and diagnostic functions gateway address.
B. addressing 201. SDP stands for
C. forwarding A. Session Description Protocol
D. routing B. session dynamic protocol
197. What is meant by Destination-based For- C. System Description Protocol
wardingin a network switch/router? D. System dynamic protocol
A. Forwarding decision is based on the
service Port at the destination. 202. You type debug IP rip on your router con-
sole and see that 172.16.10.0 is being ad-
B. Forwarding to an output Port is based
vertised to you with a metric of 16. What
on final destination of the datagram.
does this mean?
C. Forwarding decision is based on
A. The route is 16 hops away Debug IP rip
TCP/UDP information and destination ad-
dress. B. The route has a delay of 16 microsec-
onds Debug IP route
D. None of the above
C. The route is inaccessible
198. What command allow you to interface a
D. The route is queued at 16 messages a
gigabyte ethernet port 0/1
second
A. int g0/1
203. Suppose computers A and B have IP ad-
B. interface g0/1
dresses 10.105.1.113 and 10.105.1.91
C. inter g0/1 respectively and they both use the same
D. interface ge0/1 netmask N. Which of the values of N given
below should not be used if A and B should
199. Firewalls helps to provide belong to the same network?
A. speed A. 255.255.255.0
B. protection B. 255.255.255.128
C. large bandwidth C. 255.255.255.192
D. latency D. 255.255.255.224
D. all C. C
D. D
206. What command do you use to configure a
device name? 211. In Internetwork, network layer is respon-
sible for
A. myname
A. Host to User Link
B. compname
B. User to Host IP
C. hostname C. Host to Host Delivery
D. namehost D. Host to Server communication
207. The Internet offers & network- 212. What show commands allows you to see
layer service all the configurations you entered into the
A. Connection oriented Router CLI?
A. show run
B. Reliable
B. show running-config
C. connectionless and unreliable
C. show all config
D. None of the above
D. show ip route
208. Which of the following IPv4 header field
213. Which of the following statements de-
statements is correct?
scribes characteristics of the IP protocol?
A. The source and destination IPv4 ad- A. Operates without a dedicated end-to-
dresses remain unchanged while travel- end connection and uses best effort in de-
ing from source to destination. livering packets.
B. The Time to Live field is used to deter- B. Detects and retransmits packets if er-
mine the priority of each packet. rors occur.
C. The Header Checksum identifies the C. Re-assembles out of order packets
upper layer protocol type. into the correct order at the receiver end.
D. The Version field identifies the next D. Guarantees delivery of packets to the
level protocol. destination network.
NARAYAN CHANGDER
A. 12.0.0.1
215. Which layer in the OSI model is included B. 168.172.19.39
in the TCP/IP model?
C. 172.20.14.36
A. Physical
D. 175.88.44.99
B. Data Link
E. 192.168.24.43
C. Transport
220. What are the most common ways to con-
D. Application
nect to Cisco switch, to access user EXEC
216. Two connected routers are configured mode. (Pick two)
with RIP routing. What will be the result A. Virtual Interface
when a router receives a routing update
B. Packet Tracer
that contains a higher-cost path to a net-
work already in its routing table? C. Team-Viewer
A. The updated information will be added D. Console Connection
to the existing routing table Debug IP rip
221. Network Layer PDU encapsulates what
B. The update will be ignored and no fur- information?
ther action will occur Debug IP route
A. Source IP Address
C. The updated information will replace
B. Destination IP Address
the existing routing table entry
C. Source MAC Address
D. The existing routing table entry will
be deleted from the routing table and all D. Destination MAC Address
routers will exchange routing updates to
222. What is the “C” routes in Cisco Routing
reach convergence
table?
217. What is the basic purpose of ARP? A. Information on:how the route was
A. To convert MAC addresses to IP ad- learned, its trustworthiness and rating
dresses B. Identifies a directly-connected net-
B. To list all configured interfaces on a work, automatically created when an in-
system terface is configured with an IP address
and activated.
C. To list the MAC name of a host machine
C. Identifies that this is a local interface.
D. To resolve IP addresses to MAC ad- This is the IPv4 address of the interface
dresses on the router.
218. What are the three sections displayed D. Indicated the routes which are config-
when “netstat-r” is entered? ured by users.
223. A computer wants to send a packet to 227. What type of route is indicated by the
a destination host in a different network. routing code C in an IPv4 routing table on
How will the packet be sent? a Cisco router?
NARAYAN CHANGDER
ing between networks?
B. Start of frame, address, type/length
A. Physical
C. FCS/Frame check sequence and Stop
Frame B. Data Link
D. none of above C. Network
D. Transport
233. Example of proactive routing protocol
A. AODV 239. Which protocol do you use as the trans-
B. DSDV port protocol for a video application?
C. DSR A. TCP
252. Default Gateway is configured on the D. Wrapping a foil shield around the wire
host pairs.
A. Statically
257. What is the command to enter a highly
B. Through DHCP secured encrypted password cisco?
C. Both Staticallyand through DHCP A. enable password cisco
D. Either statically or through DHCP B. enable secret cisco
253. What ports are defined above 49, 152? C. enable cisco
NARAYAN CHANGDER
A. well-known ports D. password cisco encrypted
B. registered ports 258. If an ARP request is broadcast, an ARP
C. dynamic ports reply is
D. sliding ports A. Universal
254. How many layers does the TCP/IP model B. Unicast
have? C. Muticast
A. 3 D. Bidirectional
B. 4
259. When using the netstat-r command on
C. 6 a host, you see a route 0.0.0.0 0.0.0.0.
D. 7 What does this route represent?
255. Cisco routers use a fast type of RAM A. The host has no routes available for
called what? forwarding packets.
11. What is an advantage of Wifi over Ether- in HTML, but adds a layer of secu-
net? Answers:3 rity/authentication.Used when accessing
A. Cheap set up costs a webpage/website where you may want
to encrypt data-e.g. a Bank website.
B. More exensive
A. TCP/IP (Transmission Control Proto-
C. Can connect multiple devices without col/Internet Protocol)
the need for extra hardware
B. HTTP (Hyper Text Transfer Protocol)
D. Less disruption to building due to no
C. HTTPS (Hyper Text Transfer Protocol
NARAYAN CHANGDER
wires being installed
Secure)
E. Faster transfer speeds
D. FTP (File Transfer Protocol)
12. This is the telecommunication protocol that 16. TCP/IP is a set of protocols based on lay-
all computers must use to be part of the In- ers.With regards to network protocols, de-
ternet. fine what is meant by a ‘layer’.
A. Internet Protocol A. A division of network functionality
B. FTP B. The hierarchy of network cables and
C. Border Gateway Protocol their associated speeds
D. DHCP C. Packets being sent in layers.
D. none of above
13. A MAC Address is usually recorded in
A. Binary 17. You would use TCP/IP to
B. Denary A. Send data across a network
20. What is the purpose of the default gate- D. Two devices using the same / overlap-
way address configured on a host? ping channels will amplify transfer speeds
23. Explain why different wifi channels are C. They can no longer communicate
available.Answers:3 D. Nothing, layers are independent.
That’s thepoint of them
A. A channel is the range of frequencies
that will transmit data 28. Where is a MAC address stored?
B. Two devices using the same / overlap- A. In the computer
ping channels will be subject to interfer-
B. On the NIC
ence
C. As a list in the router
C. Choice of channel allows users to re-
duce / minimise interference from other D. In the modem
devices E. On the Internet
29. The wifi connection can be set up on one of 34. Which protocol governs the transmission
five different frequency bands.(i) Identify of data in a wireless network?
what is meant by the frequency of a wifi
A. SMTP
signal.Answers:2
A. The rate at which the signal changes B. TCP
// number of times it repeats per unit of C. Wi-Fi
time
D. IP
B. Measured in GHz
NARAYAN CHANGDER
C. Measured in KHz 35. The DHCP server can provide the of
D. The frequency of connection from a de- the IP addresses.
vice to a router/hub/switch A. dynamic allocation
30. Ethernet is a protocol for data transmis- B. automatic allocation
sion in a
C. static allocation
A. Wired network
D. all of the above
B. Wireless network
C. Mail server 36. Provides the rules to be followed by a web
D. Web server server and a web browser when request-
ing and supplying data.
31. Which protocol is most commonly used to
deliver web pages? A. FTP
A. HTTP B. SFTP
B. HTML C. HTTP
C. CSS
D. HTTPS
D. FTP
E. SMTP
32. What type of message is sent to a specific
group of hosts? 37. What layer of the TCP/IP protocol model
A. unicast determines the best path through the net-
work?
B. multicast
C. broadcast A. application
D. static B. transport
NARAYAN CHANGDER
ticular machine
C. FTP (File Transfer Protocol)
D. It means addressing a packet to ex-
cept a particular machine D. none of above
49. The owners of a large bakery have a Lo- 53. What is a network protocol?
cal Area Network (LAN) with a star topol-
A. Lets you connect to a device
ogy. They order their supplies over the
Internet. When data is transmitted from B. Agreed way of transferring files be-
the bakery to the supplier, network proto- tween devices on a network
cols are used.The owners of a large bakery
C. Agreed way of sending emails on a net-
have a Local Area Network (LAN) with a
work
star topology.Explain three reasons why
the bakery may use a star network topol- D. Agreed way of checking files for errors
ogy for their LAN.Answers:3
54. Which logical address is used for delivery
A. It is easy to add a new node or device
of data to a remote network?
B. Management of the network can be
done centrally A. destination MAC address
57. Which layer of the OSI and TCP/IP models 62. The shopping centre connects computers
defines services to segment and reassem- and other devices using Ethernet connec-
ble data for individual communications be- tions. The computers and devices are
59. The protocol is the transmission mech- A. ensure that all the data has arrived
anism used by the TCP/IP suite. and is not corrupted
A. ARP B. ensure that the packet has been sent
B. IP to the right place
C. RARP C. tell the computer what protocols were
used
D. None of the above
D. ensure that the user is logged on
60. Allows the transfer of files between com-
64. In descending order how are the layers
putersUsed when uploading web pages to
sorted?
a web server; When downloading a file
from a website A. Data Link Access, Transport, Applica-
tion, Internet
A. TCP/IP (Transmission Control Proto-
col/Internet Protocol) B. Internet, Application, Data Link Ac-
cess, Transport
B. HTTP (Hyper Text Transfer Protocol)
C. Transport, Internet, Data Link Access,
C. HTTPS (Hyper Text Transfer Protocol Application
Secure)
D. Application, Internet, Application,
D. FTP (File Transfer Protocol) Data Link Access
61. Which email protocol keeps a copy of the 65. In IPv4, class has the greatest number
email on the mailserver? of addresses in each block.
A. POP A. A
B. SMTP B. B
C. IMAP C. C
D. none of above D. D
66. Which PDU is processed at the transport 71. DHCP is used for
layer of the TCP/IP model? A. IPV6
A. Packet B. IPV4
B. Bits C. both a & b
C. Segment D. None of the above
D. Frame
72. The number of addresses in a class C block
67. What is the purpose of the HTTP proto- is
NARAYAN CHANGDER
col? A. 65, 534
A. When transferring large files, it is B. 16, 777, 216
used to organise them and process the C. 254
HTML code on the webs page
D. NONE OF THE ABOVE
B. It is used for email communication and
sending emails 73. How can we examine the current routing
C. It makes the transfer of a webpages tables in command prompt?
from the servers to the user’s device A. using routestart
D. It allows data to be communicated B. using netstart
through a 4 Layer model C. using netstat
68. Which protocol is used to retrieve mail D. either a or b
from a remote server to a local email 74. Choose all the MAC addresses
client?
A. 00-06:5B-BC-7A-C7
A. SMTP
B. 135.58.24.17
B. FTP
C. 239.255.255.255
C. IMAP
D. 192.168.0.0
D. POP3
75. Which best describes 2.4 GHz Wifi Fre-
69. What is the term that is used to describe quency vs 5Ghz? Answers:3
the particular type of information provided
A. More widely used.
at each layer of a networking model?
B. Not as good at travelling through
A. frame
walls.
B. packet
C. Better range
C. protocol data unit (PDU)
D. More crowded.
D. segment
E. 24 channels which do not overlap so
70. A protocol that allows email messages to avoids interference.
be read and stored on a messaging server. 76. The Encryption method used on Secure In-
A. SMTP ternet transactions is called?
B. SFTP A. Public Key Encryption
C. POP B. Public Code Encrypting
D. IMAP C. Public Key Encrypting
E. HTTPS D. Private Key Encryption
77. What are the protocols in the application the document (1) Send receipt confir-
layer? mation (1) Each packet is checked for
errors(1) if corrupt a message is sent
84. Which of the four layers in TCP/IP will C. Packets are sent as one file
choose the route the data will take? D. Confirmation is sent back to confirm
A. Application that packets have been received
B. Internet 90. allow many devices to share limited
C. Link address space on a network.
D. Transport A. Multiple addressing
B. Port addressing
85. Each network interface controller has a
NARAYAN CHANGDER
unique C. Dynamic addressing
A. MAC address D. None of the above
B. IP address 91. Transmission control protocol (TCP) splits
C. Signal data into
D. Protocol A. segments
B. groups
86. The DHCP server
C. parcels
A. maintains a database of available IP
addresses D. packets
B. maintains the information about client 92. What is the purpose of protocols in data
configuration parameters communications?
C. grants a IP address when receives a A. specifying the bandwidth of the chan-
request from a client nel or medium for each type of communi-
cation
D. all of the above
B. specifying the device operating sys-
87. NAT stands for tems that will support the communication
A. network address transformer C. providing the rules required for a spe-
B. network address translator cific type of communication to occur
C. network address translation D. dictating the content of the message
sent during communication
D. Both b and c
93. Part of the TCP/IP Protocol and used to
88. Which PDU format is used when bits are
send email between systems.Used when
received from the network medium by the
sending an email to a friend from a web
NIC of a host?
browser or email client. Is used when
A. File email is delivered from an email client,
B. Packet such as Outlook Express, to an email
server or when email is delivered from one
C. Frame
email server to another.
D. Segment A. POP (Post Office Protocol)
89. Select TWO statements which TCP/IP pro- B. IMAP (Internet Message Access Pro-
cess follows tocol)
A. Request from client sent to server C. SMTP (Simple Mail Transfer Protocol)
B. Packets are sent in order D. none of above
NARAYAN CHANGDER
destination indicate the best path. C. Directed broadcast
B. A router first installs routes with D. Multicast
higher administrative distances.
C. The value of the administrative dis- 9. host devices are assigned IPv4 addresses
tance can not be altered by the network dynamically using?
administrator. A. UPS
D. The metric is always determined B. IPV6
based on hop count.
C. IPV4
5. What is the purpose of adding an admin-
D. DHCP
istrative distance number to the end of a
static route?
10. Broadcast traffic is used to
A. To create a standard static route.
A. send packets to no one on the network
B. To create a default static route.
B. send packets to some host in the net-
C. To create a floating route.
work
D. To create a summary static route.
C. send packets to one hosts in the net-
6. What is a characteristic of a floating static work
route? D. send packets to all hosts in the net-
A. When it is configured, it creates a gate- work
way of last resort.
11. Which statement describes the effect of
B. It is simply a static route with
the copy run start command on a router
0.0.0.0/0 as the destination IPv4 address.
in enable mode?
C. It is a backup route configured with
a higher administrative distance than the A. The running configuration of the router
original destination route. is saved to NVRAM and used during the
boot process.
D. It is used to provide load balancing be-
tween static routes. B. The router reboots and loads the last
saved running configuration.
7. How do you enable EIGRP for IPv6 on a
router interface? C. A copy of the running configuration of
the router is sent by FTP to a designated
A. ipv6 eigrp [ASN] server.
B. eigrp [ASN]ipv6 unicast-routing D. A new running configuration is loaded
C. eigrp [ASN] enable ipv6 from flash memory to the router.
12. Link State packets are transmitted through 17. Which router IOS commands can be used to
troubleshoot LAN connectivity problems?
(Choose three.)
22. What is the functions of a router? 27. Which protocol is supported when OSPFv2
is used as the routing protocol?
A. It connects multiple IP networks.
A. NetBios
B. It manages the VLAN database.
B. LAT
C. It controls the flow of data via the use
of Layer 2 addresses. C. IPv4
NARAYAN CHANGDER
speed up the computation process?
23. Which of the following commands should
be used before configuring IPv6 routes? A. Listening
A. router EIGRP B. Discarding
C. Full Mesh and beast topology 38. what allows a host to send a single packet
D. Partial mesh and Stars A. Multicast transmission
C. The DNS server must be configured 47. Routing tables of a router keeps track of
manually on each host. A. MAC Address Assignments
D. The domain name must be configured
B. Port Assignments to network devices
locally on each host computer.
C. Distribute IP address to network de-
43. Provide DMZ usage vices
A. guarantee user safety D. Routes to use for forwarding data to
B. prevent viruses from entering the com- its destination
NARAYAN CHANGDER
puter
48. In Link state routing a link represents
C. take care of the traffic on the network
A. a host
D. reduce redundant packets
B. a network
44. Which options describe routers compared
to switches? C. a packet
A. Use IP address tables for information D. none of the mentioned
lookup
49. What is a characteristic of legacy inter-
B. Concerned with packet forwarding VLAN routing?
C. Operate at Layer 3 of the OSI model A. Only one VLAN can be used in the topol-
D. all the above ogy.
45. Which command do you enter to filter only B. The router requires one Ethernet link
routing updates that are sent through in- for each VLAN.
terface GigabitEthernet0/0? C. Inter-VLAN routing must be performed
A. R1(config-if)#passive-interface Giga- on a switch instead of a router.
bitEthernet0/0. D. The user VLAN must be the same ID
B. R1(config-router)#no passive- number as the management VLAN.
interface GigabitEthernet0/0
50. What is the purpose of the EIGRP topology
C. R1(config-router)#passive-interface table? (Choose 2)
GigabitEthernet0/0
A. All EIGRP routers to have a consistent
D. R1(config-router)#passive-interface view of the entire network.
default
B. All known destination networks and
46. The network administrator configures subnets that are advertised by neighbour-
the router with the ip route 172.16.1.0 ing EIGRP routers are stored
255.255.255.0 172.16.2.2 command.
C. Best routes only
How will this route appear in the routing
table? D. neighbor peer details
A. C 172.16.1.0 is directly connected, Se- 51. In which true statement EIGRP configure?
rial0/0
A. R1(config)# ipv6 unicast-routing.
B. S 172.16.1.0 is directly connected, Se-
rial0/0 B. R1(config-rtr)# ipv6 router eigrp 1
C. C 172.16.1.0 [1/0] via 172.16.2.2 C. R1(config)# ipv6 router eigrp 1
D. S 172.16.1.0 [1/0] via 172.16.2.2 D. R1(config)# ip router eigrp
55. Which step in the router boot process 60. What is the purpose of the 0.0.0.0 0.0.0.0
searches for an IOS image to load into the 10.10.1.1 command?
router?
A. To provide a default route for any non-
A. bootstrap matching network destination.
B. POST
B. To create a dynamic route for the
C. mini-IOS 10.10.1.1 network.
D. ROMMON mode
C. To create a static route for the
56. What is one of the purposes of route re- 10.10.1.1 network.
dundancy? D. To create a default gateway address
A. Minimize the effect of link failures for PC’s to forward packets.
B. Load balance across redundant paths
61. Link state routing uses algorithm.
C. Minimize the convergence time of STP
A. Quick Sort Algorithm
D. NONE
B. Floyd Warshall Algorithm
57. EIGRP packets are sent directly over IP us-
ing protocol number C. Bellman Ford
A. 88 D. Dijkstra’s
62. Which statement describes the process ID 67. Which statements about static routing are
that is used to run OSPF on a router? true?
A. It is globally significant and is used to A. It uses consistent route determina-
represent the AS number. tion.
B. It is locally significant and is used to B. It is best used for small-scale deploy-
identify an instance of the OSPF database. ments.
C. Routing is disrupted when links fail.
C. It is globally significant and is used to
NARAYAN CHANGDER
identify OSPF stub areas. D. all the above
D. It is locally significant and must be the 68. How is traffic routed between multiple
same throughout an area. VLANs on a multilayer switch?
A. Traffic is routed via subinterfaces.
63. What is the correct command?
B. Traffic is routed via physical inter-
A. ip unicast routing faces.
B. ipv6 routing unicast C. Traffic is broadcast out all physical in-
C. ipv6 unicast routing terfaces.
D. Traffic is routed via internal VLAN in-
D. ipv6 unicast-routing
terfaces.
64. A network design engineer is seeking a dy- 69. To populate the topology table, EIGRP runs
namic routing protocol that supports fast the algorithm
convergence in a Cisco environment. What
protocol allows for this? A. DUAL
B. SPF
A. EIGRP
C. Djikstra
B. OSPF
D. Bellman ford
C. RIP
70. If a router has four interfaces and each in-
D. IS-IS terface is connected to four switches, how
many broadcast domains are present on
65. what does (DHCP) stand for?
the router?
A. dynamic host configuration protocol A. 1
B. dynamic host communication protocol B. 2
C. direction host configuration protocol C. 4
D. dynamic host configuration partion D. 8
71. Which packet-switching method utilizes
66. The DHCP server provides
memory to route multiple packets using
A. Mac Address, Router Name the same destination route?
B. IP address, subnet mask, default gate- A. Cisco Express Forwarding
way B. Fast Switching
C. IPV6 number, subnet mask C. Process Switching
D. default gateway, router name D. Flow Process
72. Which of the following is not a least cost B. Hosts that receive particular multicast
algorithm? routers
82. Dynamic neighbour discovery is performed C. It loads the first image file in flash
by sending EIGRP Hello packets to the des- memory.
tination Multicast group address
D. It inspects the configuration file in
A. 224.0.0.10 NVRAM for boot instructions.
B. 224.0.0.5
86. With a broadcast, the packet contains a
C. 224.0.0.6 destination IPv4 address with all ones
D. 224.0.0.11 in the host portion (fill in the blank)
NARAYAN CHANGDER
A. 0s
83. A network engineer is tasked with sum-
marizing the routes to a remote site. B. 1s
What is the optimal route statement to C. 1s and 0s
connect to the 192.168.101.0/24 and
192.168.102.0/24 networks across the D. none of the above
corporate WAN?
87. Router(config)#ip route [network-
A. ip route 192.168.100.0 255.255.254.0 address] [Subnet Mask] [? or? ]
10.1.1.1
A. Address of next hop
B. ip route 192.168.100.0 255.255.252.0
10.1.1.1 B. Exit Interface
90. What multicast address is added when you A. IP addresses and the speed/duplex
configurate an IPv6 address? settings
94. Which information is displayed when using C. directly connected static route
the show ip interface brief command? D. fully specified static route
NARAYAN CHANGDER
C. A9CD:47FF:FE57:FE94
D. 1000:A9CD:47FF:FE57:FE94 A. 2001:DB8:0:AB00::1234
10. What is the name to identify the specific 15. Communicating between IPv4 and IPv6
computer or host of an ipv6 address? networks is done through
11. You have a device with a MAC address of 16. In which two formats can the IPv6 address
32-89-87-03-a4-13. What will be the au- fd15:0db8:0000:0000:0700:0003:400F:572B
tomatically generated link-local address? be written?
A. fe80::3089:87ff:fe03:a413 A. fd15::db8::700:3:400F:572B
B. ff02::3089:87ff:fe03:a413 B. fd15:0db8:0000:0000:700:3:400F:572B
C. 2003::3289:8703:a413
C. fd15:0db8::7:3:4F:572B
D. fe80::3289:87ff:fe03:a413
D. fd15:db8:0::700:3:4F:572B
12. Which one is NOT Types of IPv6 Ad- E. fd15:db8::700:3:400F:572B
dresses?
17. This IP address has 8 parts. Each part
A. Unspecified, Loopback, Embedded
contains 16 bit of numbers.Each part is
IPv4
separated by colons.The description above
B. Global Unicast, Unique local Unicast refers to
C. Link-local Unicast, Multicast A. IPv4
D. Multicasting task B. IPv6
C. Internet
13. Which is NOT commonly available /64
subnets? D. Extranet
A. /48-65, 536 subnets 18. What is the purpose of the command
B. /52-4096 subnets ping::1?
NARAYAN CHANGDER
26. In a networking that supporting IPv6,
C. A unique IPv6 address for each device which OSPF feature is no longer sup-
in the group ported?
D. Delivery of packets to the group inter- A. Multicast updates.
face that is closest to the sending device B. Authentication.
E. Any-to-many communication model C. Multiple areas.
21. The process of placing one message inside D. Router-ID.
another message format
27. What is the optimal subnet mask to use
A. Encapsulation when subnetting a network?
B. Protocol A. The one that maximises the number of
C. De-encapsulation subnets
D. Standard B. The one that maximises the number of
hosts per subnet
22. What is the syntax to input a link-local ad-
dress on a router interface? C. The one that balances the number of
subnets and hosts per subnet
A. ipv6 address FE80::1 link-local
D. The one that allows all devices on the
B. link-local ipv6 FE80::1 network to share the same broadcast do-
C. ipv6 FE80::1 link-local main
D. ipv6 address FE80::1
28. Which command can you enter to verify
23. How many total bits in Global Unicast that a 128-bit address is live and respond-
IPv6 Address? ing?
A. 128 bits A. traceroute
B. 64 bits B. telnet
C. 127 bits C. ping
D. 48 bits D. ping ipv6
24. Delivers packets to a single network ad- 29. What is the network address for the IPv6
dress address 2001:DB8:AA04:B5::1/64?
A. unicast address A. 2001::/64
B. IPv6 loopback address B. 2001:DB8:AA04:B5::/64
C. mulitcast address C. 2001:DB8::/64
D. anycast address D. 2001:DB8:AA04::/64
D. 128 A. IPv6
B. IPv4
33. Purpose of Internet Protocol Address.
C. IPv7
A. allow fast data transfer
D. IPv5
B. as internet service for network user
39. What is the minimum configuration for
C. as web server to store data
a router interface that is participating in
D. allows computers to send and receive IPv6 routing?
information
A. to have only a link-local IPv6 address
34. The following addresses have been B. to have both an IPv4 and an IPv6 ad-
shorted using Rule1 and/or Rule 2. Ex- dress
pand address below back to their pre-
C. to have a self-generated loopback ad-
ferred format. “::1”
dress
A. 0:0:0:0:0:0:0:000
D. to have both a link-local and a global
B. 0:0:0:0:0:0:0:1 unicast IPv6 address
C. 0:0:0:0:0:0:0:0001
40. For EIGRP neighbourship, addresses
D. 0000:0000:0000:0000:0000:0000:0000:0001 are used.
35. The header length for an IPv6 datagram A. Multicast
is: B. Link-Local
A. 8 C. Global Unicast
B. 20 D. Anycast
41. To make IPv6 addresses a little less im- 45. What is NOT advantages of subnetting by
posing, two rules were developed to make user groups?
them easier to work with. Which is the A. This allows you to optimize your rout-
rules? ing tables. All the networks within each
A. Rule 1:Omission of the Leading 0s location will aggregate to a single route.
B. Rule 2:Omission of the All-0 Hextets B. Subnetting by user groups makes it
much easier to implement a security pol-
C. Rule 2:Omission of the All-0 icy.
NARAYAN CHANGDER
D. Rule 1:Omission of the Leading 0s & C. Grouping by usage also helps track ad-
Rule 2:Omission of the All-0 Hextets dresses for
42. Which technology supports the stateless D. Grouping by usage also helps track ad-
assignment of IPv6 addresses? dresses for allocation
49. Which of the following descriptions about 54. Which IPv6 network prefix is only in-
IPv6 addresses are correct? (Multiple tended for local links and can not be
Choice) routed?
52. Using Rule 1 ( Omission of the Leading 0s), 57. Your ISP has given you the IPv6 address
reduce the IPv6 addresses to their short- 3002:FE12:A231::/48. How many /64
ened form.0000:0000:0000:0000:0000:0000:0000:0001
subnets are available with this address?
A. 0:0:0:0:0:0:0:1 A. 65, 536
B. 0:0:0:0:0:0:0:0001 B. 65, 537
C. ::1 C. 65, 538
D. ::0001 D. 65, 539
53. A global IPv6 address is similar to: 58. Which statement is not the reason IPv6 is
A. An IPv4 public address widely use nowadays?
NARAYAN CHANGDER
B. It should use the information that is A. 00:11:22:33:44:55
contained in the RA message exclusively. B. 00-11-22-33-44-55
C. It should use the information that is C. 001122334455
contained in the RA message and contact
D. 00-11-22-33-44-55-66
a DHCPv6 server for additional informa-
tion. 65. What is the function of Rule 2:Omission of
D. It should contact a DHCPv6 server for the All-0 HextetsRule?
the prefix, the prefix-length information, A. Rule 2 uses a double colon::to repre-
and an interface ID that is both random sent a all contiguous set of all zero hex-
and unique. texts.
60. What is the most common IPv6 prefix? B. Rule 2 uses a double colon::to repre-
A. /40 sent a single contiguous set of all zero hex-
texts.
B. /52
C. Rule 2 uses a double colon::to repre-
C. /64 sent a double contiguous set of all zero
D. /80 hextexts.
61. Use rule 1 reduce the IPv6 addresses be- D. Rule 2 uses a double colon::to repre-
low:2001:0000:0000:ABCD:FFFF:0000:0000:0002 sent a contiguous set of all zero hextexts.
A. 2001:0:0:ABCD:FFFF:0:0:0002 66. Which of the following is a valid IPv6 ad-
B. 21:0:0:ABCD:FFFF:0:0:2 dress
C. 2001::ABCD:FFFF:0:0:2 A. 2001:eb66:118:b35d:142:876:090:ec10
D. 2001:0:0:ABCD:FFFF:0:0:2
B. 2001:d1:67id:7f62:2d3:46d:564e:33r4
62. Which address type is not supported in C. 2001:18dh:79d4
IPv6?
D. 2001:10493::1493
A. private
B. multicast 67. What is the maximum number of bits in an
IPv6 address?
C. anycast
A. 32 bits
D. broadcast
B. 128 bits
63. What is the name of the address config-
ured on multiple routers for redundancy C. 256 bits
and performance D. 128 bits
68. With a Global Unicast Address, where 74. Dual-stack approach refers to
does the Global Routing Prefix typically A. implementing Ipv4 with 2 stacks
come from?
79. Delivers packets to the nearest interface 84. Which network technology allows devices
to communicate using both IPv4 and IPv6
A. unicast address
addressing at the same time?
B. EUI-64 identifier
A. dual stack
C. anycast address
B. tunneling
D. multicast address C. SLAAC
80. is necessary when the sender wants D. NAT64
NARAYAN CHANGDER
to use IPv6, but the receiver does not un-
derstand IPv6. 85. What is the most important motivating
factor for moving to IPv6?
A. Dual stack
A. better performance with IPv6
B. Header translation
B. IPv6 addresses that are easier to work
C. Conversion with
D. Tunneling C. better security with IPv6
D. depletion of IPv4 addresses
81. What DUAL stack networks can offer to
the end-user host? 86. For two hosts, each on a different net-
A. To pass IPv4 traffic on only IPv6 net- work, which of the following statements
work. are true? (Choose three.)
B. To pass IPv6 traffic on only IPv4 net- A. Both hosts will have the same IP ad-
work. dress
C. Address translation between LAN and B. Both hosts will have the same default
Internet. gateway address
D. To send IPv4 and IPv6 traffic. C. Both hosts will have different MAC ad-
dress
82. What two methods can be used to gener- D. Both hosts will have different IP ad-
ate an interface ID by an IPv6 host that is dress
using SLAAC? (Choose two.)
E. Both hosts will have different default
A. EUI-64 gateway address
B. random generation
87. What are the representation of 72 in the
C. ARP below IP address:72.22.7.90
D. DAD A. Identify specific mouse
B. Identify network
83. Using Rule 1 and 2 reduce the
IPv6 addresses to their shortest C. Identify specific computer
form.2001:0000:0000:ABCD:FFFF:0000:0000:0001D. Identify interface
A. 2001::ABCD:FFFF:0:0:1
88. Which is the correct format to use ping to
B. 2001::ABCD:FFFF::1 verify IPv4 connectivity?
C. 2001:0:0:ABCD:FFFF:0:0:1 A. ping 2001:DB8:1:4::A
D. 2001:0000:0000:ABCD:FFFF::0001 B. ping 2001:DB8:1:4::A/64
B. S A. 64 bit
C. H B. 96 bit
98. Contract the following IPv6 ad- 103. Fully expand the following IPv6 ad-
dress:0000:0039:009e:0000:ad58:bfc5:4024:0073dress:3d:81:7c:6343:cde7:15dc:78:15
A. 0000:039:009e:0000:ad58:bfc5:4024:0073 A. 003d:0081:007c:6343:cde7:15dc:0078:0015
B. 0:39:9e:0:ad58:bfc5:4024:73
B. 003d:0081::007c:6343:cde7::15dc:0078:0015
C. 0000:39:09e:000:ad58:bfc5:4024:73
D. 00:39:9e:00:ad58:bfc5:4024:73
C. 3d:0081:007c:6343:cde7:15dc:0078:1500
NARAYAN CHANGDER
99. Which of the following IP address is
wrong? D. 003d0:0081:007c:6343:cde7:15dc:0078:0015
A. 192.168.0.1
B. 0.0.0.255 104. Using Rule 2 (Omission of the All-0 Hex-
tets), reduce the IPv6 addresses to their
C. 256.211.3.10
shortened form.2001:0000:0000:ABCD:FFFF:0000:0000:000
D. 1.1.1.1
A. 2001::ABCD:FFFF:0:0:1
100. What technology allows routers to as-
sign IPv6 addresses automatically? (only B. 2001::ABCD:FFFF::1
global routing prefix, prefix length, de- C. 2001:0:0:ABCD:FFFF:0:0:1
fault gateway, no DNS)
D. 2001:0000:0000:ABCD:FFFF::0001
A. Stateless DHCPv6
B. stateful DHCPv6 105. Which statements about IPv6 prefixes
C. SLAAC are true?
D. DAD A. FEC0::/10 is used for IPv6 broadcast.
101. Contract the following IPv6 ad- B. FC00::/7 is used in private networks.
dress:0000:0080:b9f3:a454:0000:97de:0098:a3d3
C. 2001::1/127 is used for loopback ad-
A. 0000:0080:b9f3:a454:0:97de:0098:a3d3 dresses.
107. What type of address is automatically as- C. Global Routing Prefix, Subnet ID
signed to an interface when IPv6 is en- D. Global Routing Prefix, Subnet ID, Inter-
abled on that interface?
118. Select the valid IPv6 address from given 123. How many bits in “Global Routing Pre-
ones. (Choose two) fix”?
A. FE63::0043::11:21 A. 16 bits
B. 191.2.1.2:2:11.1 B. 48 bits
C. 64 bits
C. 2001::98
D. 47 bits
D. 2002:c0a8:101::42
124. Which is unspecified IPv6 address
NARAYAN CHANGDER
E. :2001::
A. ::0/48
119. Which of the following techniques use na- B. ::0/128
tive IPv6 connectivity?
C. :0/16
A. dual stack
D. ::0/1
B. tunneling
125. You have a device with a MAC address of
C. translation e3-42-a4-02-6f-be. What will be the au-
D. all of the above tomatically generated link-local address?
A. fe80::e142:a402:6fbe
120. Use Combining Rule 1 and Rule 2 to
B. ff02::e142:a4ff:fe02:6fbe
reduce the size of IPv6 address be-
low:FE95:FC6C:C540:0000:0000:0000:0000:9800 C. fe80::e142:a4ff:fe02:6fbe
A. FE95:FC6C:C540::98 D. 2003::e342:a402:6fbe
C. . This address identifies multiple inter- D. EIGRP, OSPF, and BGP are the only
faces and the anycast packet is only de- routing protocols that support IPv6.
livered to one address. This address can E. Link-local addresses are used to form
also be called one-to-one-of-many. routing adjacencies.
D. These addresses are meant for non-
routing purposes, but they are almost 142. what is the advantage of Solicited-
globally unique so it is unlikely they will Node?
have an address overlap. A. it is mapped to a special Ethernet mul-
NARAYAN CHANGDER
ticast address
138. What is a MAC address?
B. you can use it in context with specific
A. A protocol used to transmit data be- protocols such as DHCPv6
tween networks C. it allows packets to be sent to a group
B. A unique identifier assigned to a net- where it’s received and processed by all
work interface controller (NIC) IPv6 interfaces on the link or network.
C. An IP address used to identify a device D. none of above
on a network
143. Using Rule 1 and 2 reduce the
D. A security feature used to prevent IPv6 addresses to their shortest
unauthorised access to a network form.0000:0000:0000:0000:0000:0000:0000:0001
139. Your ISP has given you the IPv6 address A. 0:0:0:0:0:0:0:1
2000:ACAD:1234:6600::/56. What are B. 0:0:0:0:0:0:0:0001
the FIRST /64 subnets? C. ::1
A. 2000:ACAD:1234:6603::/64 D. ::0001
B. 2000:ACAD:1234:6602::/64
144. Which network migration technique en-
C. 2000:ACAD:1234:6601::/64 capsulates IPv6 packets inside IPv4 pack-
D. 2000:ACAD:1234:6600::/64 ets to carry them over IPv4 network in-
frastructures?
140. Which two are features of IPv6? A. Tunneling
A. Multicast B. Dual-stack
B. broadcast C. Translation
C. anycast D. Encapsulation
D. allcast 145. Which option is a valid IPv6 address?
141. Which statements about IPv6 and routing A. 2001:0000:130F::099a::12a
protocols are true? (Choose two) B. 2002:7654:A1AD:61:81AF:CCC1
A. EIGRPv3 was developed to support C. FEC0:ABCD:WXYZ:0067::2A4
IPv6 routing.
D. 2004:1:25A4:886F::1
B. OSPFv3 was developed to support
IPv6 routing. 146. How many bits is an IPv6 Address
A. hop limit D. 4
157. IPv6 doesn’t support 162. Which two statements describe char-
acteristics of IPv6 unicast addressing?
A. Anycast
(Choose two)
B. Broadcast
A. Global addresses start with 2000::/3
C. Unicast B. Link-local addresses start with
D. Multicast FE00:/12
C. There is only one loopback address
158. Interface G0/0/1 on RTA contains
NARAYAN CHANGDER
and it is::1
a MAC address of 00e0-fc03-aa73
and is configured with the IPv6 ad- D. If a global address is assigned to an
dress 2001::2E0:FCFF:FE03:AA73. Which interface, then that is the only allowable
method is most likely to have been used address for the interface.
to configure the interface IPv6 address?
163. What is the prefix associated with the
A. DHCPv6 IPv6 address 2001:DB8:D15:EA:CC44::1/64?
B. Auto-link
A. 2001::/64
C. ARP
B. 2001:DB8::/64
D. EUI-64
C. 2001:DB8:D15:EA::/64
159. Using Rule 2 (Omission of the All-0 Hex- D. 2001:DB8:D15:EA:CC44::1/64
tets), reduce the IPv6 addresses to their
shortened form.0000:0000:0000:0000:0000:0000:0000:0001
164. Multicast Address starts with
A. 0:0:0:0:0:0:0:1 A. FD00:
B. 0:0:0:0:0:0:0:0001 B. FF00:
C. ::1 C. FE00:
D. ::0001 D. FE80:
C. FF00:ACAD::1234:0000:0000:0001 C. FF00:ACAD::1234:0000:0000:0001
D. FF00:ACAD:0:0:1234:0:0:1 D. FF00:ACAD:0:0:1234:0:0:1
NARAYAN CHANGDER
E. server D. All of them
178. Using Rule 1 and 2 reduce the 183. Data is sent to many interfaces at once
IPv6 addresses to their shortest which have been grouped through a group
form.FE95:FC6C:C540:0000:0000:0000:0000:9800 address.
A. FE95:FC6C:C540::9800 A. Allcast
B. FE95:FC6C:C54:0:0:0:0:9800 B. Anycast
C. FE95:FC6C:C540::98 C. Unicast
D. FE95:FC6C:C540::0:0:9800 D. Multicast
179. IPV4 address has 4 part. Each part con- 184. Which of these addresses is correct
tains contains how many bits? A. 10.1.256.1
A. 4 bits B. 192:1:0:10
B. 8 bits C. 1.1.1.1.1
C. 16 bits D. 72.10.5.25
D. 32 bits
185. what command has to be run in the con-
180. Which two statements are true about fig line of a Cisco router in order to support
IPv6 Unique Local Addresses? IPv6?
A. They are identical to IPv4 private ad- A. ipv6 routing
dresses B. ipv6 switching-routing
B. They use the prefix FC00::/7 C. ipv6 unicast-routing
C. They are defined by RFC 1884 D. ipv6 unicast routing
D. They use the prefix FEC0::/10
186. How are link-local IPv6 addresses cre-
E. They can be routed on the IPv6 global ated?
internet
A. They use the device MAC address with
181. In which two formats can the IPv6 ad- a prefix of FF00.
dress fd15:0db8:0000:0000:0700:0003:400F:572BB. They are randomly generated and then
be written? (Choose two) prefixed with F808.
A. fd15:0db8:0000:0000:700:3:400F:527B C. A combination of the local-link prefix
FE80 and the 64-bit IPv6 identifier
B. fd15:0db8::7:3:4F:527B D. They are randomly generated and then
C. fd15::db8::700:3:400F:527B prefixed with FFCC
187. What hextet in ipv6 will tell you the sub- B. The default gateway address is cor-
net? rectly configured.
NARAYAN CHANGDER
5.1 Introduction
1. TYPES OF SWITCH IS / ARE 5. Why doesn’t modern ethernet require a
A. UNMANAGED media access control method?
B. MANAGED A. It uses one pair of wires for sending
data.
C. SMART / INTELLIGENT
D. ALL B. It uses all wires for communication.
C. It uses half duplex.
2. Connection to the line modems is / are
D. It uses full duplex.
A. 2-wire
B. 4-wire 6. What is the purpose of the CRC value that
C. 6-wire is found in the FCS trailer field of a frame?
D. both 2-wire & 4-wire A. To verify the integrity of the received
frame.
3. Wired ethernet is defined by which proto-
col? B. To verify the physical address in the
frame.
A. IEEE 802.11
C. To verify the logical address in the
B. IEEE 802.15
frame.
C. IEEE 802.11
D. To compute the checksum header for
D. IEEE 802.3 the data field in the frame.
4. This is the maximum speed limit that you
7. Directional capacity modems is / are
can achieve
A. Bandwidth A. half duplex
B. Throughput B. full duplex
C. Data rate C. both
D. Up Stream D. none
8. Which of the following is a data link pro- B. The receiving node identifies the be-
tocol? ginning of a frame by seeing a logical ad-
dress.
D. AA:AA:AA:AA:AA:AA A. WLAN
B. WAN
12. CRC stands for
C. PAN
A. cyclic redundancy check
D. LAN
B. code repeat check
C. code redundancy check 17. This allows one or more links to be aggre-
gated together to form a Link. This pro-
D. cyclic repeat check
vides increased bandwidth and fault toler-
13. How does a receiving node identify the be- ance if one link fails the other one will take
ginning and end of frames received from a over the transmission.
continuous string of bits received from the A. Link aggregation
medium?
B. Trunk lines
A. The transmitting node sends an out-of-
C. STP
band signal to the receiver about the be-
ginning of the frame. D. Port Link
NARAYAN CHANGDER
C. Bits
19. Transmission type modems is / are D. Data
A. Asynchronous E. Segment
B. Synchronous
25. Choose the correct statement from the fol-
C. Both lowing
D. none A. PPP can terminate the link at any time
20. What is the maximum number of VLANs B. PPP can terminate the link only during
you can create on a switch? the link establishment phase
A. 4094 C. PPP can terminate the link during the
B. 4095 authentication phase
B. Route Poisoning C. IP
A. NIC B. NAT
B. Hub C. DNS
C. Router D. ARP
29. Which statement describes the logical link 33. Types of Modems is / are
control sublayer in Ethernet standards? A. Directional capacity
D. Is used for sharing bandwidth 36. Which of the following is a function of the
MAC sublayer?
31. Packets are packaged into frames at which
A. It is responsible for Media Access Con-
layer of the OSI model?
trol.
A. data link
B. It handles communication between up-
B. transport per and lower layers.
C. physical C. It performs the function of NIC driver
software.
D. presentation
D. It adds control information to network
E. application
protocol layer data.
32. The type of communication where only one 37. hich scheme/ strategy is suitable to es-
device can transmit and the other can only tablish the communication between the ac-
receive data. Thecommunication is unidi- cess point (AP) and the infrastructure of
rectional, like a one-way road. LANs?
A. Simplex A. Wired
B. Half-duplex B. Wireless
C. Full-duplex C. Both a & b
D. duplexer D. Cannot Predict
38. TYPES OF ROUTER IS / ARE 43. Which category of HDLC frames undergoes
A. WIRED error and flow control mechanisms by com-
prising send and receive sequence num-
B. WIRELESS bers?
C. CORE A. U-frames
D. EDGE
B. I-frames
E. ALL
C. S-frames
NARAYAN CHANGDER
39. It is a 12-hexadecimal identifier of every D. All of the above
networking interface.
A. MAC address 44. A circuit board that is inserted on a com-
puter to connect to the network is called a
B. IP address
C. IPv6
A. HUB
D. Serial Number
B. NIC
40. The protocol that converts IP addresses C. SWITCH
into MAC addresses is called
D. ROUTER
A. ARP
B. RARP 45. Which of the following devices resides at
the data link layer of the OSI model?
C. IP
D. MAC A. Router
B. Passive hub
41. What are the frames issued by the sec-
ondary station of HDLC, known as? C. Ethernet switch
A. Link D. Repeater
B. Command
46. For devices to be members of a VLAN their
C. Response network data frames must conform to the
D. None of the above ?
A. IEEE 802.1Q
42. Which of the following correctly identifies
features provided by the frame header B. IEEE 802.1D
fields of the Data Link layer? C. IEEE 802.11
A. It identifies the Layer 3 protocol type D. IEEE 802.11ax
and establishes flow control fields.
B. It contains the Layer 3 source and des- 47. What do you call the link between two
tination addresses used for route determi- switches?
nation. A. Ethernet cable
C. It establishes port connections be-
B. Link aggregation
tween network applications.
C. Branch
D. It includes information about user ap-
plications. D. Trunk
48. FOR CONNECTING TWO DIFFERENT NET- A. Carrier Sense Multiple Access with Col-
WORK PATHS DEVICE IS USED lision Avoidance
NARAYAN CHANGDER
59. NIC ALSO CALLED AS B. Sender Sliding Window
8. Then, it was time to blow out the candles 13. I comb my hairs four times in a day.
at my birthday cake while everybody sang A. comb
the birthday song.
19. WHICH IS THE CORRECT FORM OF THE 24. Hamming code C(7, 4) can detect up to
GIVEN EXPRESSION? OPEN THE KNOT bit error & can correct up to bit error.
A. RELEASE THE KNOT A. 1, 2
B. UNTIE THE KNOT B. 2, 1
NARAYAN CHANGDER
C. TAKE THE KNOT C. 2, 3
D. none of above D. 3, 2
20. An extra bit added to a string of binary 25. Which error detection method is more effi-
code to ensure the number of 1-bits are ei- cient?
ther even or odd, depending upon the sys- A. Parity check
tem used.
B. Cyclic redundancy check
A. ARQ
C. Parity & Cyclic redundancy check
B. Parity Check
D. Hamming code
C. Checksum
26. A forward error-correcting code corrects
D. Check Digit errors by
21. Punctuate the following sentence:you A. requiring partial re-transmission of
work as a teacher in vivekanand school the signal
A. You work as a teacher in Vivekanand B. requiring re-transmission of the entire
School. signal
B. you work as a teacher in Vivekanand C. requiring no part of the signal to be re-
school. transmitted
C. You work as a teacher in vivekanand D. using parity to correct the errors in all
school. cases
D. you work as a teacher in vivekanand 27. Correct the sentence:Mans are busy in a
school meeting.
22. Check sum:sender side-The message is di- A. Men
vided into bit words & The value of the B. Mens
checksum word is set to
C. Man
A. 8, 0
D. all of these
B. 8, 1
28. WHICH WORD HAS TO BE REPLACED?
C. 16, 0
NONE OF THE WORKERS ARE HAPPY.
D. 16, 1
A. NONE
23. When Jack me, I a letter. B. ARE
A. phoned/ has been writing C. THE WORKERS
B. has phoned/ was writing D. none of above
40. Techniques for error detection is / are: B. It takes a long time to calculate
A. Simple Parity check C. It can only be done once
B. Two-dimensional Parity check D. It is expensive to design
C. Checksum 46. How does an ARQ check work?
D. Cyclic redundancy check A. The sender resends the data if it does
E. all options not receive confirmation after a certain
amount of time
NARAYAN CHANGDER
41. HE AND MYSELF WERE THERE.THE WORD
B. The sender compares the sent data to
MYSELF SHOULD BE REPLACED BY
the original and sees if an error occurred
A. I
C. The receiver checks with the sender to
B. ME find out whether the data was sent cor-
C. MINE rectly
60. What is the check digit for this bar code? A. decorate
157842355654 B. decorates
A. 3 C. decorated
B. 7 D. none of above
C. 9
66. Although I rarely wake up so early in the
D. 5 morning, I did not feel sleepy at all. My
ride was uneventful and we arrived at
NARAYAN CHANGDER
61. What form of error correction does TCP
use? AUH terminal 3 before six in a morning.
A. Them, an
A. Parity Bits
B. Our, the
B. FEC
C. They, a
C. CRC
D. We, the
D. ARQ
67. WHICH PART OF THE SENTENCE HAS THE
62. What size error can Hamming code cor-
ERROR:HE IS ANNOYED WITH YOUR BE-
rect?
HAVIOUR.
A. Single-bit errors
A. IS ANNOYED
B. 2-bit errors
B. WITH
C. 4-bit errors
C. YOUR BEHAVIOUR
D. 8-bit errors
D. none of above
63. Which of the following is a benefit of FEC
68. Full duplex operation
over ARQ?
A. requires two pairs of cables
A. It reduces the amount of redundant
data being sent along with a frame. B. can transfer data in both directions at
once
B. It reduces the likelihood that data will
need to be retransmitted. C. requires modems at both ends of the
circuit
C. It can correct all forms of errors with-
out retransmission. D. all of the above
D. There are no benefits of FEC over ARQ. 69. Cyclic Redundancy check is used in
64. The Hamming distance d(10101, 11110) A. Codewords
is B. Datawords
A. 2 C. Network
B. 3 D. Encryption and Decryption
C. 4 70. Two bits are same (0+0 or 1+1), the re-
D. 5 sult is Two bits are different (0+1 or
1+0), the result is
65. My brother helped to decorating the house
with streamers and balloons. My father A. 0, 0
bought all kinds of food and drinks. B. 0, 1
NARAYAN CHANGDER
C. reaching would treated it with great care.
D. none of above A. treats
B. treat
83. When I up this morning, my roommate
already. C. treating
B. newspaper = news + paper 99. A form of error detection that uses a sys-
tem of acknowledgements and timeouts.
C. read = re + ad
A. Echo Check
D. none of above
B. Automatic Repeat ReQuests (ARQ)
94. WHICH PART OF THE SENTENCE HAS THE C. Check Digit
ERROR? I HAVE FORGOT TO BRING YOUR
D. none of above
PICTURE.
A. PRONOUN 100. The of error is more difficult than
A. Detection, Correction
B. INFINITIVE
B. Correction, Convolution
C. PRESENT PERFECT
C. Correction, Detection
D. none of above
D. Convolution, Detection
95. Two-dimensional parity-check can detect
101. My whole family was going to Kota Kin-
up to bit errors.
abalu for our vacation. We were going to
A. 1 taking the airplane to Kota Kinabalu.
B. 2 A. took
C. 3 B. take
D. 4 C. taked
D. takes
96. WHICH WORD HAS TO BE CORRECTED? I
FOUND ONE BOOK IN THE CLASS. 102. Our flight was at eight in the morning.
My whole family woke up at four. Us
A. FOUND
quickly got ready and waited for the taxi
B. ONE BOOK to arrive.
C. IN A. We
D. none of above B. Our
C. Them
97. What is a disadvantage of ARQ over FEC?
D. Me
A. You may retransmit data a lot, which
causes delays. 103. How many bits in the data unit has
B. It cannot fix all errors. changed in a single bit error
A. 1 bit
C. You have to send a lot of redundant
data which reduces data transfer speed. B. 2 bits
D. It isn’t practical for most types of net- C. 3 bits
work. D. 4 bits
104. Match the correct common noun with 109. A generator of cyclic code that contains a
its proper noun.city Ryan International factor of x+1 can detect all
Schoolman Mr. Shyamlalschool New York A. Even number of errors
A. city-New York, man-Mr. Shyamlal, B. Odd number of errors
school-Ryan International School
C. Single error
B. city-Mr. Shyamlal, man-New York,
D. Burst error
school-Ryan International School
110. She walked into the house and is greeted
NARAYAN CHANGDER
C. city-Ryan International School, man-
New York, school-Mr. Shyamlal by dusty furniture in the living room.
A. was
D. all of them are correct
B. are
105. Correct following the sentence.Monkeyies C. were
are jumping on the trees.
D. none of above
A. Monkeys
111. The three child chooses to join Drawing
B. Monkeies
Club.
C. Monkeyes A. children ; choose
D. None of these B. childs ; choice
106. Types of error / errors: C. childs ; choosing
B. Multiple bits error 112. Choose correct common noun for the fol-
lowing proper noun:”Lotus Temple”
C. Burst error
A. monument
D. all options
B. city
107. Using even parity which of the following C. house
three 8 bit binary numbers has been trans- D. town
mitted incorrectly?
A. 0 1 0 1 1 0 0 1 113. HE WALKS AS IF HE IS A KING.
A. AS IF HE WAS
B. 1 0 0 1 0 0 0 1
B. AS IF HE WERE
C. 0 0 1 0 1 1 0 1
C. IF HE WAS
D. none of above
D. none of above
108. Identify the mistake and correct it.My 114. My mother bakes a chocolate cake for me.
mother wears beautiful airrings while go- When the important day arrived, I was so
ing to office. delighted.
A. earings A. bake
B. earrings B. baked
C. areings C. baking
D. none of above D. none of above
115. In an odd parity scheme, what would 121. WHICH PART OF THE WORD HAS ERROR
be the correct parity bit for the binary IN IT? I SAW A BAD DREAM LAST NIGHT.
string:1110111 A. SAW
117. Would you like to go to the movies to- 123. My mother tells me that she since she
morrow? -Sure. By then I my exam. was four.
127. Indicate the false statement. From the 128. In error correction the receiver cor-
transmitter the signal deterioration be- rects the error without requesting retrans-
cause of noise is usually mission
A. unwanted energy A. Onward
B. predictable in character B. Forward
C. present in the transmitter C. Backward
D. due to any cause D. Retransmission
NARAYAN CHANGDER
5.3 MULTIPLE ACCESS PROTOCOLS (MAC)
1. use of length field in a data frame 5. persistent method
A. total size of the frame A. continuously sense the medium
B. total size of the data B. randomly sense the medium
C. size of mac address
C. don’t sense the medium
D. none of the above
D. none of the above
2. Which multiple access technique is used by
IEEE 802.11 standard for wireless LAN? 6. Switch works in layer
A. CDMA A. datalink layer
B. CDMA/CD
B. physical layer
C. CDMA/CA
C. transport layer
D. None of the above
D. network layer
3. A TDMA system uses 25 MHz for the for-
ward link, which is broken into radio chan- 7. Who is the superior station in random ac-
nels of 200 kHz. If 8 speech channels are cess protocols?
supported on a single radio channel, how
many simultaneous users can be accommo- A. server
dated? B. master
A. 25 C. admin
B. 200
D. none of the above
C. 1600
D. 1000 8. In , each station is allocated a band to
send its data. In other words, each band
4. IEEE has defined the specifications for a is reserved for a specific station, and it be-
wired LAN, called , which covers the longs to the station all the time.
physical and data link layers.
A. CDMA
A. IEEE802.5
B. IEEE802.7 B. None of these
C. IEEE802.6 C. TDMA
D. IEEE802.3 D. FDMA
9. ALOHA protocols relies on the of the 14. In , the stations share the bandwidth
receiver of the channel in time.
NARAYAN CHANGDER
LLC sublayer and the MAC sublayer. B. Figure of merit
A. datalink layer C. Signal to noise ratio
B. physical layer D. Mean
C. transport layer 27. is a multiple-access method in which
D. network layer the available bandwidth of a link is shared
in time, frequency, or through code, be-
22. An Ethernet MAC sublayer receives 38 tween different stations.
bytes of data from the upper layer. How
many bytes of padding must be added to A. Controlled access
the data? B. Channelization
A. 8 C. Random access
B. 10 D. None of these
C. 9
28. p-persistent method
D. 7
A. probability outcome
23. This describes how the Ethernet proto- B. random outcome
col regulates communication among con-
nection points. C. continuous outcome
A. Carrier Sense Multiple Access/Collision D. none of the above
Detect
29. Preamble contains
B. Discontinuous transmission
A. Address
C. Aggregator
B. Data
D. Wait and response
C. Guard bits
24. Mention the use of backoff time. D. Trail bits
A. waiting time before resending the data
30. In Ethernet addressing, if the least signifi-
B. waiting time after resending the data
cant bit of the first byte is 0, the address
C. ack timer is
D. propagation time A. unicast
25. GSM is an example of B. multicast
A. TDMA cellular systems C. broadcast
B. FDMA cellular systems D. none of the above
31. To avoid collisions on wireless networks, 37. Select the random access protocol from the
was invented. given list
NARAYAN CHANGDER
43. wireless networking uses what method as
the media access method? C. 48-bits
A. CSMA/CD D. 64-bits
B. CTS/RTS 49. synchronization overhead is required
C. CSMA/CA in TDMA due to transmission.
D. CSCD/CA A. High, burst
NARAYAN CHANGDER
00-00-C8?
B. UDP
A. A unicast MAC address.
C. IP
B. A broadcast MAC address.
D. TCP/IP
C. A multicast MAC address.
D. A supercast MAC address. 6. How many Hexadecimal digits are needed
to represent one byte?
2. If the encapsulated data within an Eth-
ernet broadcast frame is an IPv4 packet, A. 2
the host portion of the destination address B. 4
contains
C. 8
A. All 1s in binary
D. 16
B. All 0s in binary
C. No value 7. Which of the following standards is typi-
D. Every address in the LAN cally used in a rollover cable?
9. What protocol is used by a source host 14. This technology is used to distribute elec-
to determine the MAC address associated trical power along with network data on
with a known IPv4 address? twisted-pair (CAT 5 or higher). Power is
NARAYAN CHANGDER
need to configure. You need to connect a
A. Logical link control is specified in the workstation to the router’s console port
IEEE 802.3 standard. to complete the configuration tasks.<br
B. The LLC sublayer adds a header and a />Which type of cable would you most
trailer to the data. likely use?
C. The data link layer uses LLC to commu- A. Rollover
nicate with the upper layers of the proto- B. Straight-through
col suite.
C. RG6
D. The LLC sublayer is responsible for the
D. Crossover
placement and retrieval of frames on and
off the media. 25. On Ethernet networks, the hexadecimal
20. This is a 48-bit, 12-digit hexadecimal num- address FF-FF-FF-FF-FF-FF represents the
ber that ranges from 0-9 or A-F. MAC address.
B. IP Address B. unicast
C. Subnet Mask C. multicast
D. Subnet Address D. anycast
21. Provides a central connection for multi- 26. Which advantage does the store-and-
ple media segments on the same subnet. forward switching method have compared
When a signal is received, it forwards that with the cut-through switching method?
signal only to the port where the destina- A. collision detecting
tion device is connected. (Full-Duplex)
B. frame error checking
A. Router
C. faster frame forwarding
B. Switch
D. frame forwarding using IPv4 Layer 3
C. Hub and 4 information
D. Server
27. You have a network connected using a
22. The Remote Desktop Protocol uses port physical bus topology. One of the cables
that connects a workstation to the bus
A. 3389 breaks.<br />Which of the following best
describes what effect this will have on net-
B. 53 work communications?
C. 22 A. Devices on one side of the break will
D. 445 be able to communicate with each other;
devices on the other side will not be able what affect this will have on network com-
to communicate. munications?
NARAYAN CHANGDER
ing packets.
D. 80 D. The source Layer 2 address of incom-
ing frames.
37. A Cisco switch with memory buffering
is used to buffer frames in queues linked 42. Which of the following forwarding method
to specific incoming and outgoing ports. characteristics is not used in cut-through
A. store-and-forward switching?
A. low latency
B. fast-switching
B. may forward runt frames
C. port-based
C. checks the CRC before forwarding
D. cut-through
D. begins forwarding when the destina-
38. The Hypertext Transfer Protocol uses port tion address is received
46. What type of cabling is used with 51. A switch repeats the message to a branch
100BaseTX Fast Ethernet networks? of the network
55. What is the maximum size of an Ethernet 60. An Ethernet MAC address consists of a 48-
frame? bit binary value. How many Hexadecimal
digits are needed to represent 48 bits?
A. 1518 bytes
A. 4
B. 56 bytes
B. 8
C. 128 bytes
C. 12
D. 1024 bytes
D. 16
NARAYAN CHANGDER
56. This is a 32-bit binary number represented 61. Which is a multicast MAC address?
as four octets (four 8-bit numbers). Each
octet is separated by a period. A. FF-FF-FF-FF-FF-FF
B. 5C-26-0A-4B-19-3E
A. MAC Address
C. 01-00-5E-00-00-03
B. IP Address
D. 00-26-0F-4B-00-3E
C. IPv6 Address
62. The media access control method of all Eth-
D. Physical Address
ernet networks is
57. Which of the following use the CSMA/CD A. CSMA/CA
access method? B. CSMA/CD
A. 10BaseFL C. Polling
B. Token Ring D. Token passing<br />
C. 1000BaseT 63. A network technician issues the arp-d *
D. FDDI command on a PC after the router that
is connected to the LAN is reconfigured.
58. Switches are used to improve transmission What is the result after this command is
speed by reducing the number of (se- issued?
lect all that apply) A. The ARP cache is cleared.
A. devices in a collision domain B. The current content of the ARP cache
B. collisions is displayed.
C. network congestion C. The detailed information of the ARP
cache is displayed.
D. nodes
D. The ARP cache is synchronized with
59. Connection-oriented protocol. Ensures de- the router interface.
livery of data by requiring the recipient
64. Which Gigabit Ethernet standard uses mul-
of a network transmission to send an
timode fiber optic cabling and supports net-
acknowledgement of each and every IP
work segments up to a maximum of 550
packet it receives.
meters long?
A. UPD A. 1000BaseCX
B. IP B. 1000BaseSX
C. TCP C. 1000BaseZX
D. UDP D. 1000BaseT
65. Which of the following are acceptable 68. Which statement describes the treatment
types of values for the source MAC ad- of ARP requests on the local link?
dress?
C. All devices will be able to communi- 72. The logical network address identifies a
cate. network segment called a
D. Devices on one side of the missing ca- A. Subnet
ble will be able to communicate with each B. Server
other; devices on the other side of the
missing cable will not be able to commu- C. Domain
nicate. D. Website
73. The Secure Shell protocol uses port 78. A MAC address is the unique address
that is used when a frame is sent from a
A. 25
single transmitting device to a single des-
B. 80 tination device.
C. 443 A. Unicast
D. 22 B. Broadcast
C. Multicast
74. The minimum Ethernet frame size is
NARAYAN CHANGDER
bytes. Anything smaller than that should D. Simulcast
be considered a “runt frame”.
79. Provides a central connection for multi-
A. 16 ple media segments on the same subnet.
B. 32 When it receives a signal, it is repeated
out all other ports. (Half-Duplex)
C. 64
A. Switch
D. 128
B. Hub
75. What routing table entry has a next hop C. Server
address associated with a destination net- D. Network Interface Card
work?
80. Ethernet bandwidth in full-duplex mode is
A. directly-connected routes
B. local routes
A. 20 Mbps
C. remote routes
B. 10 Mbps
D. C and L source routes C. 30 Mbps
76. When a switch configuration includes a D. 50 Mbps
user-defined error threshold on a per-port
81. Given your knowledge of IP Protocol,
basis, to which switching method will the
which statement is most accurate.
switch revert when the error threshold is
reached? A. IP encapsulation is modified based on
network media.
A. fragment-free
B. IP relies on Layer 2 protocols for trans-
B. fast-forward mission error control.
C. cut-through C. MAC addresses are used during the IP
D. store-and-forward packet encapsulation.
D. IP relies on upper layer services to
77. Connects two network segments that handle situations of missing or out-of-
have different subnet addresses. order packets.
A. Server
82. The Domain Name System protocol uses
B. Hub port
C. Switch A. 22
D. Router B. 3389
D. The packet will be sent to the default 95. A Layer 2 switch is used to switch incom-
gateway first, and then, depending on the ing frames from a 1000BASE-T port to a
response from the gateway, it may be port connected to a 100Base-T network.
sent to the destination host. Which method of memory buffering would
work best for this task?
91. The Hypertext Transfer Protocol over Se-
cure Socket Layer uses port A. port-based buffering
NARAYAN CHANGDER
B. 443 C. shared memory buffering
D. fixed configuration buffering
C. 21
D. 25 96. What could cause a PC to access LAN but
cannot access devices on other networks.
92. What makes fiber preferable to cop-
A. The cable is not connected properly to
per cabling for interconnecting buildings?
the NIC.
(Choose three.)
B. The computer has an invalid IP ad-
A. greater distances per cable run
dress.
B. lower installation cost
C. The computer has an incorrect subnet
C. limited susceptibility to EMI/RFI mask.
D. durable connections D. The computer has an invalid default
E. greater bandwidth potential gateway address.
93. Which two functions or operations are per- 97. What statement describes a characteristic
formed by the MAC sublayer? (Choose of MAC addresses?
two.) A. They are only routable within the pri-
A. It is responsible for Media Access Con- vate network.
trol. B. They are added as part of a Layer 3
B. It performs the function of NIC driver PDU.
software. C. Each interface must be globally
C. It adds a header and trailer to form an unique.
OSI Layer 2 PDU. D. They have a 32-bit binary value.
D. It handles communication between up-
98. Which switching method uses the CRC
per and lower layers.
value in a frame?
E. It adds control information to network
A. cut-through
protocol layer data.
B. fast-forward
94. The first half (first 6 digits) of the MAC C. fragment-free
address is assigned to what?
D. store-and-forward
A. The region
B. The ISP 99. Which two statements describe features
or functions of the logical link control sub-
C. The manufacturer layer in Ethernet standards? (Choose
D. The host two.)
D. The data link layer uses LLC to commu- B. routing packets toward the destination
nicate with the upper layers of the proto- C. encapsulating PDUs from the trans-
col suite. port layer
E. The LLC sublayer is responsible for the D. placement of frames on the media
placement and retrieval of frames on and E. collision detection
off the media.
104. When two devices share a transmission
100. You need to transfer data from one lap- medium they are in the same (which
top to another, and you would like to use makes the most sense? )
an Ethernet cable. You do not have a hub
or a switch.<br />Which type of cable A. network
should you use? B. collision domain
A. Crossover C. Ethernet
B. Rollover D. LAN
C. Loopback 105. Which information is used by routers to
D. Straight-through forward a data packet toward its destina-
tion?
101. Users are complaining that sometimes
network communications are slow. You A. source IP address
use a protocol analyzer and find that B. destination IP address
packets are being corrupted as they pass C. source data-link address
through a switch. You also notice that this
only seems to happen when the elevator D. destination data-link address
is running. What should you do? 106. Identify both the minimum and maximum
A. Add a UPS system of an Ethernet frame.
B. Install shielded cables near the eleva- A. 56 bytes
tor B. 64 bytes
C. Add a dedicated A/C unit to the switch C. 128 bytes
closet
D. 1024 bytes
D. Install a dedicated power circuit for
the switch E. 1518 bytes
102. This is used to distinguish the network 107. Which destination address is used in an
and host address portions of an IP Ad- ARP request frame?
dress. A. 0.0.0.0
A. Default Gateway B. 255.255.255.255
B. Subnet Mask C. FFFF.FFFF.FFFF
NARAYAN CHANGDER
B. A NIC only needs a MAC address if con-
114. How do you express 3F in decimal?
nected to a WAN.
C. The first three bytes are used by the A. 18
vendor assigned OUI. B. 34
D. The ISO is responsible for MAC ad- C. 45
dresses regulations.
D. 46
109. Which of the following is a recommended
order of converting numbers? E. 63
A. Decimal → Binary → Hexadecimal
115. When two or more devices try to send a
B. Decimal → Hexadecimal → Binary message at the same time using the same
C. Binary → Decimal → Hexadecimal transmission medium it is called a
D. Hexadecimal → Decimal → Binary A. Collision
110. Which switching method has the lowest B. Conflict
level of latency?
C. Delay
A. cut-through
D. Backoff
B. store-and-forward
C. fragment-free 116. What part of the Ethernet frame is used
D. fast-forward to perform an error check?
A. CRC in the trailer
111. The length for fiber optic cables typically
ranges from B. source MAC address in the header
A. 100 meters to 40 kilometers C. destination MAC address in the header
B. 200 meters to 60 kilometers
D. protocol type in the header
C. 300 meters to 200 kilometers
D. 500 meters to 100 kilometers 117. What happens if you change the network
card in a host?
112. How is the binary number 0000 1010 ex-
pressed in hexadecimal? A. The host keeps the original physical ad-
dress
A. 10
B. A B. The host gets a new physical address
126. The maximum cable length for UTP and B. User Datagram Protocol
STP is C. User Designated Protocol
A. 300 Meters D. User Designed Process
B. 100 Meters
129. These identify the transmission speed
C. 10 Meters and cable type.
D. 500 Meters A. Standards
NARAYAN CHANGDER
127. What does the term “attenuation” mean B. Distance
in data communication? C. Protocols
A. loss of signal strength as distance in- D. Devices
creases
130. When a switch receives a Layer 2 broad-
B. time for a signal to reach its destina-
cast frame, what will it do with the
tion
frame?
C. leakage of signals from one cable pair
A. Drop the frame
to another
B. Send the frame out all ports except the
D. strengthening of a signal by a network-
port on which it received the frame
ing device
C. Send the frame to all ports that are
128. UDP stands for registered to forward broadcasts
A. User Data Provision D. Send the frame to all ports
9. many businesses use this Wi-Fi technology 14. A device that can be used to to connect dis-
to allow the public an access point to a similar types of Network is
wireless network A. repeater
A. hotspots B. bridge
B. coldspot C. gateway
C. satellites D. router
D. bluetooth 15. Used by businesses to promote them-
selves on the internet.
10. Devices that connect entire networks to
each other. They use IP addresses to for- A. Blogs
ward packets to other networks. They B. Microblogs
NARAYAN CHANGDER
B. If the central hub crashes the whole C. Access Point
network breaks D. Bridge
C. Only four computers can be attached 21. What do you call on the physical address
to the ring of the device?
D. Everyone has to sit facing each other A. IP Address
19. Which of the following answers refers to 24. NIC Stands for
a data link layer (Layer 2) device designed A. Network Intersection cord
to forward data packets between Local
B. Network Interface Card
Area Network (LAN) segments?
C. No Interface connection
A. Router
D.
B. Hub
25. You have learned that there are three
C. Switch
types of network topology. Which one is
D. Firewall NOT network topology?
NARAYAN CHANGDER
B. Laptop B. Microblogs
C. Server C. Macroblogs
D. Workstation D. B-blog
36. If all devices are connected to a central hub, 41. Disadvantages of networks?
then topology is called
A. Share files
A. Bus Topology
B. Viruses
B. Ring Topology
C. Share Internet
C. Star Topology
D. Roaming
D. Tree Topology
42. network designed for a town or city
37. To increase security of emails you need the
A. LAN
following except for
B. MAN
A. Use strong passwords
C. WAN
B. Use spam filters
D. PAN
C. Do not change password regularly
D. Run anti-virus and anti-spam software 43. What is a client?
38. A Network device has two ports. It splits A. Powerful Computers that provide ser-
one network to two networks to decrease vices to other computers
the number of collisions or it connects 2 B. Computers that ask for the services a
networks to one network.It uses the MAC server provides
address to take the decision for forward- C. Physical connection between devices
ing the packets.
D. A circuitboard with the components to
A. Switch send/receive data
B. Hub
44. Two or more computers connected close to-
C. Bridge gether in a local area e.g. building or office
D. Router is called?
45. Network devices called concentrators be- 49. Which of these is an advantage of the bus
cause they serve as a central connection topology?
point for a LAN. It extends the range of
NARAYAN CHANGDER
C. Server C. CAN (Campus Area Network, Cluster
D. WAP Area Network)
56. Which of the three main topologies rely on D. LAN (Local Area Network)
a single main cable to transmit data pack-
ets? 61. It is a network security system that con-
trols the incoming and outgoing network
A. Ring
traffic based on an applied rule set It es-
B. Star tablishes a barrier between a trusted, se-
C. Bus cure internal network and another net-
work (e.g., the Internet) that is assumed
D. none of above
not to be secure and trusted. It exists both
57. A device that connects networks with dif- as a software solution and as a hardware
ferent protocols- appliance.
A. Switch A. Hub
B. Hub B. Firewall
C. Gateway C. Client
D. All of these D. Repeater
58. How many wires are connected in a RJ 45
connector? 62. What network device is used to connect
two LAN’s together that uses the same
A. 4 protocol?
B. 8 A. Hub/Switch
C. 2
B. Router/Modem
D. 16
C. Bridge
59. A network device has several ports and
D. Server
refers to a table of MAC addresses to de-
termine which port to use to forward the
63. Why do NICs do?
frame.It forwards the data to the exact
destination only. A. Allow devices to control one another
A. Bridge B. Allow devices to connect to a printer
B. Switch C. Allows devices to interface with one
C. Router another
D. Repeater D. Allow devices to connect to a network
NARAYAN CHANGDER
76. spans a large geographic area, such as a
state, province or country. WANs often D. Passive Hub
connect multiple smaller networks, such as
local area networks (LANs) or metro area 81. What networking device is software-
networks (MANs). based and makes decisions about whether
A. MAN to forward a packet based on whether the
destination is part of the same LAN or an-
B. WAN
other LAN?
C. PAN
A. A switch
D. LAN
B. A bridge
77. Which device broadcasts any data to all de-
vices on a network? C. A repeater
A. hub D. A router
B. switch
82. which type of computer on a network pro-
C. repeater vides something such as file space?
D. router A. Client
78. A device that connects the internal net- B. Server
works and the outside network (Internet).
In such a situation, it could also act as a C. Peer
proxy server and a firewall. D. Node
A. Gateway
B. Switch 83. A Network component with high-speed
network that consists of one or more hard
C. Repeater drives, a fiber optic cables connection, and
D. Hub an embedded operating system. It con-
nects to the network, allowing users on
79. Which of these is an advantage of the star the network to access and share files,
topology? stream media, and back up data to a cen-
A. Devices do not rely on each other to tral location
function
A. NAS
B. It looks nice
B. SAN
C. A central server is not needed
C. Router
D. Only one cable is needed to connect ev-
erything together D. WAP
84. is any set of instructions that tells the 89. What is a server?
hardware what to do and how to do it.
A. Powerful Computers that provide ser-
87. Which network is able to connect and send 92. Which is the correct answer to the be-
data to each computer via central hub or low:”A computer that does not communi-
switch without looking where the data is cate with other devices”
sent? A. LAN
A. Star
B. WAN
B. Router
C. Stand-Alone
C. Bus
D. Server
D. LAN
93. network that covers a broad area using
88. Ethernet Twisted pair cable has how many
leased telecommunication lines
conductors?
A. 6 CONDUCTORS A. LAN
B. 8 conductors B. MAN
C. 10 conductors C. WAN
D. 12 conductors D. NET
NARAYAN CHANGDER
A. wifi
95. Is an electronic device that connects to
B. hotspots
the Internet via an ISP (Internet Service
Provider). It converts digital data to ana- C. ethernet
log signals for transmission over a phone D. server
line.
100. A device that amplifies a signal as it
A. Modem
passes through it to counteract the effects
B. Hub of attenuation.
C. Repeater A. Server
D. Switch B. Client
96. networks connect computers together C. Cable
over large physical distances, remotely D. Repeater
connecting them over one huge network
and allowing them to communicate even 101. A network device that transfers small
when far apart. amounts of DC current over Ethernet cable,
A. WAN (Wide Area Network) along with data, to power other network
devices such as Wi-Fi access points.
B. MAN (Metropolitan Area Network)
A. WAP
C. LAN (Local Area Network)
B. NIC
D. CAN (Campus Area Network)
C. POE
97. *Performs more than one function. *More
D. EAP
convenient to purchase and configure just
one device. *Combines the functions of 102. Which is not a wired method of connect-
a switch, a router and a wireless access ing to the internet?
point into one device. The Linksys E2500
A. Dial-up
is an example of it.
B. Cable
A. Switch
C. ADSL
B. POE
D. HTTPS
C. WAP
D. Multipurpose Devices 103. Which best describes the function of a
router?
98. Which is the correct answer to the be-
low:”A number of devices that communi- A. Receives Internet signal-shares signal
cate with each other without the need of with network
the internet” B. Connects the computers to the printer
NARAYAN CHANGDER
6.1 Introduction
1. Which is not a cause for undesired energy 4. A address is usually contained in the
wastage in WSNs? packet showing where the message has
A. Sensing of events come from and where it is going to. What
is this address called
B. Idle listening
A. Device Address
C. Overhearing in case of densely de-
ployed sensor networks B. Static Address
D. Collision of transmitted frames C. IP Address
D. none of above
2. Which of the following is true for Peer-To-
Peer networks.Answers:3 5. Question 6:Which of these is a benefit of
A. The network relies on a central server a peer-to-peer network? (6-9)
B. All computers have equal status A. Antivirus scans can be run across all
computers from one computer
C. No additional hardware / software
needed to set up this type of network B. All software updates can be run across
all computers from one computer
D. Each device can act as a client and a
server C. All computers can be maintained from
one computer
E. Additional hardware would be needed
e.g. high end powerful servers D. Files and peripherals can be shared
3. Near Field Communication (NFC) is consid- 6. Which of these is a device found within a
ered a computer?
A. Wireless Local Area Network A. Network Interface Card
B. Wireless Wide Area Network B. URL
C. Wireless Personal Area Network C. Router
D. None of the above D. LAN
11. The shopping centre has many staff mem- D. none of above
bers, and management workers who need
14. Which of these is a vulnerability of MAC
to communicate and share files via the
address filtering?
network. The network technician has
suggestedimplementing a virtual network. A. The user must enter the MAC.
NARAYAN CHANGDER
15. Which protocol is a signaling communica-
tion protocol used for controlling multime- D. WLAN
dia communication sessions? 21. Which of these protocols is most secure?
A. session initiation protocol A. WEP
B. session modelling protocol B. WAP
C. session maintenance protocol C. WPA
D. resource reservation protocol D. WPA2
16. What is the fastest type of transmission 22. Which of these is a benefit of an Ad Hoc
media? Network
A. Fibre Optic A. It’s a flexible network
32. On one specific day the network wifi 36. On-Demand Routing Protocol examples
transmission speed is significantly slower are follows, except
than on previous days.Describe the factors A. AODV
that can influence the wifi transmission
speed.Answer:2 B. DSR
C. TORA
A. Number of people accessing the net-
work the more people = the more D. LAR
data being transmitted the more data E. CGSR
NARAYAN CHANGDER
being transmitted = more collisions
37. Tunnelling technique is use in
B. Interference e.g. electrical inter-
ference stops/slows the transmission A. WAP
of data B. Mobile IP
C. Number of people accessing the net- C. WLL
work the less people = the slower the D. none of above
data will tarnsfer the less data being
transmitted = more collisions 38. Which of the following is an example of a
peripheral device?
D. Speed of transmission media:
WIFI is slower than Ethernet. A. Printer
B. Speaker
33. Networks send and receive messages in
small units. These units are known as C. USB
what? D. All THREE
A. Data 39. Which of the following phone generation
B. Pockets starts using Smart Phone
C. Packets A. 1G
D. Files B. 2G
C. 3G
34. Which network hardware is used to con-
D. 4G
nect networks to other networks such as
the internet? 40. Which type of transmission media is the
A. Hub least expensive to manufacture?
B. Switch A. Coaxial
C. Router B. Twisted pair cable
the WLAN could be captured by an at- 47. The technique that makes possible the task
tacker. of listening and talking in communication
system is called
NARAYAN CHANGDER
53. What is the Extensible Authentication Pro- B. Open WiFi
tocol (EAP)?
C. Personal Area Networks
A. a framework for transporting authenti-
D. Bluetooth
cation protocols
B. a subset of WPA2 57. Requirements of Mobile IP include
C. the protocol used in TCP/IP for au- A. Scalability
thentication
B. Security
D. a technology used by IEEE 802.11 for
encryption C. all the above
D. none of the above
54. A bank uses a local area network to con-
nect all the computers in its head office.The 58. Each device on a network is known as
bank network uses failover.Describe what what:
is meant by failover and justify the need
for failover in the network.Answers:2 A. Node
A. -Redundant components / hardware / B. Link
capacity (servers / disks / routers etc) is C. Connection
built into the network-If there is a failure,
network automatically switches to use the D. Wireless
spare capacity
59. To which class the following IP address be-
B. -Allows the bank to continue to oper- longs to:15.10.10.1
ate / avoids network downtime-avoiding
A. Class A
loss of income / customer dissatisfaction
/ loss of records / other example related B. Class B
to the bank C. Class C
C. A failover team is on site so that if the
D. Class D
network fails they have the skills to get it
back up and running. 60. The 802.11b and the 802.11g wireless
D. The network needs to be temporarily technologies operate at what frequency
shutdown however the time is kept to a range ?
minimum to avoid losing money for the A. 2.4 GHz
business
B. 3.4 GHz
55. If Sheila wanted to connect headsets to her
C. 4.4 GHz
smartphones, she should use this wireless
technology ? D. 5.4 GHz
61. Registration Reply in mobile IP is con- B. He should ensure that the driver
veyed in a wasn’t accidently updated through the
Windows Update.
62. What is the unauthorized access of infor- 66. Which of these is a WAN?
mation from a wireless device through a A. The internet
Bluetooth connection called?
B. Costa WIFI
A. bluejacking
C. Your phone personal hotspot
B. bluesnarfing
D. Burnt Mill Academy Network
C. Bluetooth snatching
67. Which Protocol uses CSMA/CA
D. Bluetooth spoofing
A. HTTP
63. Sending requests to a single server using B. Wi-Fi
hijacked machines is an example of [1-
C. TCP
3]
D. IP
A. Phishing
E. Ethernet
B. DDOS
C. Worm 68. What is the purpose of a switch?
71. A WEP key that is 128 bits in length D. An internet service that translates al-
A. has an initialization vector (IV) that is phabetic names into IP addresses
the same length as a WEP key of 64 bits
75. Which of these is a benefit of cloud com-
B. cannot be cracked because it is too puting?
long
A. It can reduce costs for a company as
C. cannot be used on access points that they do not need to buy additional hard-
use passphrases ware to store data
NARAYAN CHANGDER
D. is less secure than a WEP key of 64 bits
B. It is the cheapest option for a company
because shorter keys are stronger
to store their data as they do not need to
72. The wireless technology 802.11g uses this pay for cloud computing
radio band and transmits at a maximum C. Data can be accessed anywhere as an
speed of what ? internet connect is not needed to access
A. 2.4 GHz, 11 Mb/sec data and software stored in cloud comput-
ing
B. 5 GHz, 11Mb/sec
C. 2.4 GHz, 54 Mb/sec D. Data will always be more secure in a
cloud computing system
D. 5 GHz, 54 Mb/sec
76. Message sent:“hello how are you? ”
73. Which of these is a benefit of cloud com-
The packets are split as follows:Packet
puting? (3-6)
1:“hello”Packet 2:“how”Packet
A. It can reduce costs for a company as 3:“are”Packet 4:“you? ”Packets are
they do not need to buy additional hard- received at their destination as fol-
ware to store data lows:Packet 1, Packet 3, Packet 4, Packet
B. It is the cheapest option for a company 2What would this message be if the pack-
to store their data as they do not need to ets were read in the order in which they
pay for cloud computing arrived? How might this problem be
solved?
C. Data can be accessed anywhere as an
internet connect is not needed to access A. Hello how are you?
data and software stored in cloud comput- B. you? hello are how
ing
C. hello are you? how
D. Data will always be more secure in a
cloud computing system D. none of above
74. Which of these is a correct definition of 77. Question 2:Which of these is a character-
DNS? (6-9) istic of a LAN? (3-6)
A. An internet service that is used to de- A. It covers a wide geographical area
tect errors
B. Computers are connected together us-
B. An internet service that stores data in ing a leased line or a satellite
large quantities for different companies
C. Users can share files and peripherals
C. An internet service that provides a
messaging service for users to communi- D. Data can only be transmitted at a very
cate slow rate
NARAYAN CHANGDER
B. Phones and other wireless devices can B. 20 Mbps
sign up. C. 54 Mbps
C. They have reduced speeds. D. 64 Mbps
D. More unorganised.
94. The “ “ has a list of all domain names
89. what kind of waves do WiFi networks and their associated IP addresses.
use? A. Domain Name Server
A. microwave B. Internet
B. radio C. World Wide Web
C. sound D. WAP
D. light
95. mode is used whenever either end of
90. The best location for an omni-directional a security association is gateway
antenna in your home or office is ? A. Tunnel
A. On the roof B. Encapsuling
B. Adjacent to the outside wall C. Gateway
C. Near the center D. Transport
D. In a basement
96. Foreign agents and home agents advertise
91. A(n) is any type of hardware capable their presenceperiodically using
of transmitting data, instructions, and in-
A. ICMP messages
formation between a sending device and a
receiving device. B. Agent Advertisement Messages
A. communications satellite C. Packet Header
B. Bluetooth D. Routing protocols
C. communications device 97. AES-CCMP is the encryption protocol stan-
D. Ethernet dard used in
A. Bluetooth
92. What is streaming?
B. WPA2
A. Data sent to a device in a constant flow
when on the internet.. C. IEEE 802.11
B. Throwing your tablet into a river. D. WPA
NARAYAN CHANGDER
108.
that have appropriate wireless capability D. MAN
can communicate via radio waves with
other computers or devices. 114. If a client leaves a subnet, it should re-
lease the configuration received by the
A. Bluetooth
server using
B. LTE
A. DHCPOFFER
C. TCP/IP
B. DHCPDISCONNECT
D. Wi-Fi C. DHCPACK
109. Which language used in WAP enabled de- D. DHCPRELEASE
vices
115. The medium access control (MAC) is a sub-
A. HTML layer Of
B. WML A. data link layer
C. XML B. network layer
D. none of above C. physical layer
110. Which of these are the objectives of net- D. application layer
work security?
116. is an end-system or router that can-
A. Identification change its point of attachment to the inter-
B. Authentication net using mobile IP
C. Access control A. Corresponding Node
D. Lock B. Mobile Node
C. Foreign Agent
111. denotes the length of time the adver-
tisement for agents is valid. D. Home Agent
A. Lifetime 117. What is cloud computing? (1-4)
B. TTL A. Storing large amounts of data on a sin-
C. hop limit gle computer
D. checksum B. Using the internet to store and access
data and programs remotely
112. Which is the faster wired transmission C. Storing hard copies of data as a
media? backup
A. Ethernet/Twisted Pair D. Using the internet to communicate
B. Fibre Optic with other users
118. Why is a rogue AP a security vulnerabil- 122. Which of the following phone generation
ity? is based on Internet Protocol (IP)
121. Which of these are NOT used to transmit 126. Specification for a wireless LAN are
data in a network called
A. Radio waves in the air A. Standard 802.3z
B. Fibre optic cable B. Standard 802.3u
C. Metal cables made of copper C. Standard 802.3x
D. High tensile steel cables D. IEEE 802.11
127. Which description below is a Class C net- 132. John tests the rooms in his home and
work address? finds that those on the east side of his
A. network. host. host.host house don’t get a good wireless signal and
can’t use the network. What can he do to
B. network.network.host.host correct the situation ?
C. network.network.network.host A. Buy a more powerful WAP
D. none of above B. Upgrade to 802.11g
C. Install a second WAP
NARAYAN CHANGDER
128. What is the primary weakness of wired
equivalent privacy (WEP)? D. Install a router
A. It functions only on specific brands of 133. Question 8:Which transmission media is
APs. capable of having a much higher band-
B. Its usage creates a detectable pat- width? (6-9)
tern. A. Coaxial
C. It slows down a WLAN from 104 Mbps B. Twisted pair cable
to 16 Mbps.
C. Plastic
D. Initialization vectors (IVs) are difficult
D. Fibre optic
for users to manage.
134. The destination sequence distance vector
129. Which of the following is a technique to routing can be viewed as which one of the
mask the source IP address of a network following?
attack?
A. Reactive routing protocol
A. DDoS
B. Proactive routing protocol
B. Replay
C. Hybrid routing protocol
C. Sniffing
D. Multicast routing protocol
D. Spoofing
135. Responsible for ensuring data packets
130. Data transmitted over a network is bro- are transferred quickly and reliably across
ken down into “ “ a network through a router via the best
A. Packets path
B. Sections A. TCP/IP
C. Blocks B. IP
C. In order to let other people see your 140. is a series of network standards that
web site, it will be placed on a web server. specifies how two wireless devices com-
municate over the air with each other.
145. Which layer Iin WAP performs security 150. Zoe is organising a LAN-party. Her
friends will each bring a computer to the
A. WAE
party so that they can play games against
B. WST each other.Describe what is meant by a Lo-
cal Area Network (LAN).Answers:3
C. WTP
A. Computers are connected to each
D. WTLS
other-
146. WPA stands for: B. The computers are geographically re-
NARAYAN CHANGDER
mote/ more than a mile apart
A. Wi-Fi Protected Access
C. Communication medium is not owned
B. Wireless Protection Access by the group
C. Wi-Fi Private Access D. Dedicated wired or WiFi connections
D. Wireless Private Access owned by the group
E. Restricted to a small geographical
147. is the subnet the MN belongs towith area
respect to its IP address
151. Which octet determines the class of an IP
A. Home Network address?
B. Home Agent A. First
C. Foreign Network B. Second
D. Foreign Agent C. Third
D. Fourth
148. A shopping centre allows customers to
access free wifi whilst shopping.(a) The 152. Which network hardware is used to send
users can access the Internet via the wifi data packets between computers without
connection.Identify four network hard- knowing which destination PC will receive
ware devices that can be used to support the packet. It broadcasts the packet to
the wifi connections.Answers:4 all connected PC’s and uses up more band-
width as a result.
A. Wireless access point (WAP)
A. Hub
B. Hub/
B. Switch
C. Router/Modem
C. Router
D. Switch
D. none of above
E. Ethernet cables
153. Which of these statements is true?
149. address is used when mode moved to A. A client-server network has a central
foreign network computer that provides services to the
A. HA address rest of the network
D. Each computer on a client-server net- the whole office. Therefore, what stan-
work is maintain separately dard should be used when replacing these
WAPs?
164. A preshared key (PSK) of fewer than 169. Which of these is true about peer-to-peer
characters may be subject to an attack if networks?
that key is a common dictionary word. A. They are illegal
A. 20 B. Resources are not held on a central
B. 32 server
NARAYAN CHANGDER
170. Bluetooth falls under the category of
165. This device connects two dissimilar net-
A. local area network (LAN)
works together
B. short area network (SAN)
A. Hub
C. paired-device network (PDN)
B. gateway
D. personal area network (PAN)
C. switch
171. is used by many companies to hide
D. non of the above internal resources and to use only some
globally available addresses
166. The 802.11A wireless technology oper-
ates at what frequency range ? A. Firewalls
B. Network Address Translation
A. 7 GHz
C. Home Agent address
B. 5 GHz
D. Unicast routing
C. 3 GHz
172. Identify key mechanism in Mobile IP
D. 1 GHz
A. Agent discovery
167. This wireless standard is backwards- B. Tunnelling
compatible with 802.11g?
C. Registration
A. 802.11a D. Re registration
B. 802.11b
173. Which of the following class of IP pro-
C. 802.11n vides a maximum of only 254 host ad-
D. 802.11q dresses per network ID?
A. A
168. Question 1:What is a standalone com- B. B
puter? (1-4)
C. C
A. A computer that is not connected to a
D. D
network
B. A computer that is being used as a 174. Computers on this network are over a
server large geographical area:
A. WAN
C. A computer that does not have any pe-
ripherals attached to it B. LAN
D. A computer that is used by only one C. MAN
person D. SAN
175. allows the encapsulation of packets 180. If no agent advertisements are present
of one protocol suite into the payload por- or the inter-arrival time is too high, and
tion of a packet of another protocol suite an MN has not received a COA by other
NARAYAN CHANGDER
B. A client-server network is cheap and
C. all of this above
easy to set up
D. none of this
C. A client-server network cannot be
used to share files 191. Which of the following is wide-area wire-
D. Each computer on a client-server net- less networks?
work is maintain separately A. Bluetooth
195. What transmission media would you use 199. What are the benefits of the Cloud? An-
to connect to a network interface card swers:3
(NIC) in a wired network?
C. Maximum Transport Unit 209. To share files and printers without a WAP
D. Maximum Transmission Unit you can take advantage of this wireless
network
204. There is Classes of IP address version A. Infrastructure
4.
B. Ad hoc
A. 5 C. Multiple access
B. 3 D. WAN
NARAYAN CHANGDER
C. 4
210. Which is a feature of a Client-Server Net-
D. 2 work?
205. What two types of connectivity can net- A. Central Hub
works make use of? B. All devices have an equal status
A. Bluetooth and infrared C. No expensive hardware required
B. Wired and wireless D. Each device can be a client and server
C. Blu-ray and DVD 211. Performs a ‘barrier’ between a potential
D. none of above attacker and the computer system
A. Packet sniffing
206. which type of authentication is least se-
cure B. Firewalls
B. 802.11b B. Ultra-wideband
C. 802.11g C. Near-field communications
223. Which technology should be used instead roam from one AP coverage area to an-
of LEAP? other.
A. STREAK D. Some versions of operating systems
B. PEAP favor a network that broadcasts an SSID
over one that does not.
C. LEAP-2
D. REAP 228. A “ “ is an interconnection device that
connects two or more devices together and
NARAYAN CHANGDER
224. Which IS NOT a benefit of a wireless net- helps in solving the issue of data collisions.
work?
A. Switch
A. Cheap-No cables
B. Router
B. More reliable than a wired network
C. WAP
C. Cables don’t restrict movement
D. Less chance of getting tangled cable D. NIC
225. Which is a feature of a Peer-to-Peer Net- 229. What is meant by a virtual network?
work? A. A network that is controlled by a cen-
A. Central Hub tral server
B. All devices have an equal status B. A network that is used only to share
C. Expensive hardware usually required software
D. All services have to be requested from C. Controlling computers and devices re-
the server motely using the internet
232. Sheldon is shopping for a new wireless 237. A company, OCR Supermarkets, has su-
router for Leonard as a Birthday Present. permarket stores throughout the country.
Which wireless router will give the fastest The computers for each store connect to
240. defines the current location of the 245. A Wireless Access Point (WAP) is
MNfrom an IP point of view. A. A ‘hotspot’
A. Care-of Address B. A way of connecting to a network wire-
B. Home Network lessly
NARAYAN CHANGDER
241. Speeds of up to 150 Mbps can be ob- communicate with each other without the
tained by this wireless standard ? user of a wireless access point.
A. 802.11a A. decentralized LAN
B. 802.11b B. ad-hoc mode
C. 802.11g C. wireless mesh
D. 802.11n D. none of above
C. Like a business card used at network- B. Data sent to your device in a continu-
ing meetings ous flow.
D. Used to send greetings on National C. Where a smart phone acts as an ac-
Network Interface Day cess point allowing other devices to share
its mobile broadband connection.
8. What is the access point (AP) in a wireless
D. A computer network used for data
LAN?
communication between devices
A. device that allows wireless devices to
NARAYAN CHANGDER
connect to a wired network 13. supports low energy radio operation
18. Mostly is used in wireless LAN 23. Virtual terminal protocol is an example of
A. time division multiplexing A. Network layer
NARAYAN CHANGDER
B. IEEE 802.3
D. Huge Performance Radio Link Access
C. IEEE 802.11 Node
D. IEEE 802.15
35. In wireless ad-hoc network
30. Type of troubleshooting methodology
where a guide is used to move forward A. access point is not required
of the troubleshooting process. B. access point is must
A. Ocular
C. nodes are not required
B. Structured
D. all nodes are access points
C. Shoot from the hip
D. Layered 36. An interconnected collection of piconet is
31. Adheres to approach for managing re- called
sources and support mapping to HTTP. A. scatternet
A. RETful B. micronet
B. IoT
C. mininet
C. Restful
D. multinet
D. RESTful
32. Which one of the following event is not 37. oWPAN Adaption layer contains?
possible in wireless LAN? A. Header compression
A. acknowledgement of data frames
B. Fragmentation
B. multi-mode data transmission
C. All the above
C. collision detection
D. connection to wired networks D. None of the above
33. When a wireless network in a small office 38. An organization that develops communica-
is being set up, which type of IP address- tion standards in electrical, computer, en-
ing is typically used on the networked de- gineering, and related disciplines?
vices?
A. IEEE
A. private
B. Six Sigma
B. public
C. wireless C. ANSI
D. network D. ISO
NARAYAN CHANGDER
B. electromagnetic interfearence
C. crosstalk B. flame retardant
D. none of above C. RJ-45 T rated
D. none of above
2. The process of transferring a mobile sta-
tion from one base station to another is 7. Which network can result in devices slow-
A. Mobile Switching ing down when other devices access
them?
B. Roaming
A. Client server network
C. Hand off
B. Peer to peer network
D. Forward channel
C. Both client server and peer to peer
3. IPv4 IP addresses are bit binary num-
D. none of above
bers
A. 2 8. What type of handovers is supported by
LTE?
B. 8
A. Hard handover only
C. 32
B. Soft handover only
D. 128
C. Hard and soft handover
4. Which term describes the physical layout
D. Hard, soft and softest handover
of a Network?
A. Topology 9. Which of the following is a benefit of a
wired network? [2 answers]
B. Topping
A. They are usually quicker than wireless
C. Topiology
networks
D. Toppology
B. They are much cheaper than wireless
5. A student has completed his part of a networks
group research paper, and needs to share C. They are more secure than a wireless
it with a classmate. He sees the class- network
mate as they’re crossing the parking lot
between classes. Which WLAN architec- D. They are much easier to install than
ture could they use to transfer the file wireless networks
from one laptop to the other? 10. What type of attack is a wireless disasso-
A. Ad hoc ciation attack?
B. Mesh A. Downgrade attack
NARAYAN CHANGDER
D. orthogonal frequency division multiple
access 27. Which of the following would be the best
solution for securing a small network lack-
22. Why do computers need a MAC address?
ing an authentication server?
A. So the internet knows where to deliver
A. WPA-PSK
data
B. WPA2-Enterprise
B. So the postman knows where to de-
liver a letter C. WPA2-PSK
C. So a network knows where to send D. WPA-Enterprise
data
28. This is the family of specifications for wire-
D. So the servers know where to deliver
less local area networks (WLANs) devel-
letters to
oped by a working group of the Institute of
23. A standards and trade organization com- Electrical and Electronics Engineers (IEEE).
posed as an alliance of trade associations A. 3G
for electronics manufacturers in the United
States. B. 802.11
A. TIA/EIA C. 802.3
B. CompTIA D. 802.5
C. IEEE 29. A disturbance that can affect electrical cir-
D. none of above cuits, devices, and cables due to electro-
magnetic conduction and possibly radia-
24. What is a Network? tion.
A. Mobile Service Provider A. electromagnetic crosstalk
B. A number of devices linked together to
B. crosstalk
allow them to share resources.
C. electromagnetic interference
C. A TV Channel
D. none of above
D. none of above
25. Antennas that are designed to emit equally 30. provides control over the usage of mo-
in all directions. bile devices within a designated area.
A. Omni-directional Antennas A. Geofencing
B. Directional antennas B. Quarantine network
C. - C. Geolocation
D. - D. GPS tagging
31. Which order are the layers in when receiv- C. Both client server and peer to peer
ing data? D. none of above
42. Is a wireless media that is limited to low- 47. What is the average uploading speed of
speed, short-range communications, but 4G LTE network?
has the advantage of communicating with A. 1-3 Gbps
many devices at the same time
B. 2-5 Gbps
A. Radio Frequency (RF)
C. 1-3 Mbps
B. Bluetooth
D. 2-5 Mbps
C. Infrared (IR)
NARAYAN CHANGDER
D. Micro waves 48. The first wireless encryption protocol.
Since it is considered a weak encryption,
43. A hacker takes advantage of a Bluetooth it is not recommended.
connection to send a virus to a user’s A. RADIUS
phone. What kind of security breach has
occurred? B. WAP
46. Which network will allow you to login 51. What are the main parts of a Mobile Sta-
from any device on the network? tion in a GSM Network?
A. Client server network A. MT-Mobile Terminal
B. Peer to peer network B. SIM-Subscriber Identity Module
C. Both client server and peer to peer C. Both A and B
D. none of above D. None
52. What does a WAP allow devices to do? B. Files and peripherals can be shared
A. Access the internet with wires C. Antivirus scans can be run across all
C. Join a network (with wires) D. All software updates can be run across
all computers from one computer
D. Join a network (without wires)
58. what dose WAN stand for?
53. A security protocol designed to strengthen
existing WEP implementations without re- A. walking area network
quiring the replacement of legacy hard- B. wide area network
ware is called:
C. wired area network
A. PEAP
D. wireless area network
B. TKIP
59. Which one sends data to all devices, and
C. CCMP
makes no decisions?
D. WPA2
A. A hub
54. ESS stands for: B. A router
A. Extended Service Set C. An access point
B. Enhanced Set Service D. A switch
C. Enhanced Service Settings
60. Correctly identify the characteristics of the
D. Extended Supported Service IEEE 802.11g wireless standard.
55. Which of these would best describe a bio- A. Maximum data signaling rate of 54
metric access mechanism? Mbps
A. A physical access card B. 2.4 GHz frequency range
B. A fingerprint C. Maximum data signaling rate of 11
Mbps
C. The outline of a door key
D. 5.0 GHz frequency range
D. A pseudo-random token generator
E. Multiple In Multiple Out (MIMO)
56. *CBT Question What most affects signal
quality of a wireless LAN? 61. *Which type of device provides warning of
unauthorized attempts to access network?
A. A Encryption using WEP.
*answer choices
B. B Insulation on connecting network ca-
bles. A. *CMOS
57. Which of these is a benefit of a peer-to- 62. Which of the following subsystem pro-
peer network? (6-9) vides radio transmission between mobile
A. All computers can be maintained from station and MSC?
one computer A. BSS
NARAYAN CHANGDER
C. multimeter
D. none of above 69. A BTS is also called by general public?
64. What does “MAC” stand for in “MAC AD- A. Mobile tower
DRESS”?
B. Exchange
A. Media Access Card
C. Charging Point
B. Multi Area Connection
C. Media Access Control D. None
D. Multi Access Connector 70. What is the main purpose of a peer to peer
65. Which networking device sends data to all network?
devices connected to it and lacks the intel- A. To control the security of the network.
ligence to determine the best path for data
B. To share files and resources between
packets?
devices.
A. A hub
C. To manage the users on the network.
B. A router
D. To back up data to a central location.
C. An access point
D. A switch 71. Hosting means
66. Which network allows you to share files A. A company with lots of servers run
and resources across your devices? your website or online shop
A. Client server network B. Downloading songs from a P2P net-
B. Peer to peer network work
C. Both client server and peer to peer C. Translating IP addresses into URLs
D. none of above D. Pretending to be someone you are not
on the Internet
67. What is a MAN?
A. A WAN and a LAN that are connected 72. Which of the following would be most
together likely to experience interference from cord-
B. A metropolitan Area network, it inter- less telephones? (choose TWO)
connects users with computer resources A. Bluetooth
in a geographical area
B. 802.11b
C. An Ethernet cable connected to a com-
puter to produce a LAN C. 802.11a
D. Sankey Mesh D. Infrared
73. What is Packet switching? 78. If you wanted to adjust the boundary
A. Switching numbers and letters to the range of a wireless network, which WAP
configuration setting should you change?
83. What is the technical word for ‘Delay’? 88. An interconnected collection of piconet is
called
A. Bandwidth
A. Scatternet
B. Latency
B. Micronet
C. Backbone router
C. Mininet
D. Web Server
D. Multinet
84. Which of these is most associated with the 89. How many bits is an IPv4 address?
NARAYAN CHANGDER
802.1X standard?
A. 16
A. Ethernet topology
B. 32
B. Network Access Control
C. 64
C. Ethernet trunking D. 128
D. Spanning Tree Protocol
90. Which network can continue to function if
85. Identify the correct IEEE 802.11a wireless a device fails?
standard characteristics. A. Client server network
A. Maximum data signaling rate of 54 B. Peer to peer network
Mbps C. Both client server and peer to peer
B. 5.0 GHz frequency band D. none of above
C. Carrier Sense Multiple Access/Collision
91. Hexagon shape is used for radio coverage
Avoidance
for a cell because.
D. 2.4 GHz frequency band A. It uses the maximum area for cover-
E. Maximum data signaling rate of 11 age
Mbps B. Fewer number of cells are required
86. A port-based network access control used C. It approximates circular radiation pat-
to secure wireless connection. tern
NARAYAN CHANGDER
D. The wireless network will not appear A. Mobility
in the list of available networks
B. Flexibility
105. Which network will copy files between
devices and create duplicate fiies, making C. Scalability
it difficult to keep track of where the files D. Probability
are stored and which ones are the most up
to date? 110. Which option refers to a channel access
A. Client server network method used in 2G GSM networks?
B. Peer to peer network A. CSMA/CA
C. Both client server and peer to peer B. TDMA
D. none of above C. CSMA/CD
106. A is a LAN that uses no physical D. CDMA
wires which requires computers and de-
vices to have built-in wireless capability 111. What is a computer network?
or the appropriate wireless network card,
USB adapter, or other wireless device. A. A single computer not connected to
any others.
A. wireless LAN (WLAN)
B. wide area network (WAN) B. Lots of computers in one place.
113. Which one of these best describes a mesh 118. A metric that compares the amount of us-
topology? able data and the background noise that is
being sent over a transmission channel is
115. Which Bluetooth class has the highest 120. What tool should you use to troubleshoot
power output? wireless signal loss and low wireless net-
work signal coverage?
A. Class 1
A. Protocol analyzer
B. Class 2
B. WAP power level controls
C. Class 3
C. Logical network diagram
D. NFC
D. Network mapper
116. Which of the following indicates poor net-
work performance? 121. Which of the following controls access to
A. Low Bandwidth a shared transmission medium in 802.11
networks?
B. Good signal quality
A. CWDM
C. Low Number of Users
B. CSMA/CD
D. Expensive Hardware
C. CDMA
117. Too many users/devices can slow down
D. CSMA/CA
the local area network because
A. The router cannot process the data 122. What is the maximum channel bandwidth
packets quick enough. of the 802.11ac standard.
B. The bandwidth is being shared be- A. 20 MHz
tween the users.
B. 22 MHz
C. The devices are not all connecting us-
C. 40 MHz
ing Ethernet
D. 80 MHz
D. All of the devices are connected using
WiFi E. 160 MHz
123. A tool used to terminate twisted pair ca- C. Private lines leased from BT
ble to a patch panel. D. Ethernet cables
A. signal terminator
129. The layer adds a header to the packet
B. punch down tool coming from the upper layer that includes
C. grounding wire the logical addresses of the sender and re-
ceiver.
D. none of above
A. data link
NARAYAN CHANGDER
124. UMTS use which multiple access tech- B. network
nique?
C. physical
A. CDMA D. none of the above
B. TDMA
130. A user swipes her smartphone across a
C. FDMA tag on a poster to obtain showtimes for a
D. SDMA movie she wants to see later that evening.
What wireless technology transmitted the
125. Which signaling method breaks data into data?
pieces and sends the pieces across multiple
A. Bluetooth
frequencies in a defined range?
B. WiMAX
A. FHSS
C. NFC
B. DSSS
D. Infrared
C. OFDM
131. *Which antenna is designed to be very di-
D. CDMA rectional?
126. What do networks allow data to be A. *A. Yagi antenna
shared between? B. *B. parabolic antenna
A. Computer to human communication C. *C. Omni Directional
B. Computer to device communication D. none of above
C. Computer to GPU communication 132. Bluetooth supports
D. Computer to computer communication A. point-to-point connections
127. Which topology requires a multi point B. point-to-multipoint connection
connection? C. both point-to-point connections and
A. Bus point-to-multipoint connection
D. multipoint to point connection
B. Star
C. Mesh 133. What would you disable to prevent
broadcasting of the wireless network
D. Ring name?
128. MyBank plc runs a private WAN. What A. MAC filtering
will join it all together? B. Shared secret key
A. Normal telephone wires C. SSID broadcast
B. The Internet D. 802.1x
A. WPAN E. Scalability
138. Which is not part of a data packet? 143. In a piconet, one master device
139. Wired Network is better than Wireless 144. Which transmission media is the most ex-
Network in the following Aspects (Choose pensive?
All Correct Answers): A. Plastic
A. Security B. Twisted pair cable
NARAYAN CHANGDER
A. interfearence
B. wire jabber B. TKIP
C. crosstalk C. WPA
D. none of above D. RADIUS
146. Which of the following EAP options relies 151. Which property of OFDMA system allows
on client-side and server-side certificates adjacent subcarriers to be used without in-
for authentication? terference?
A. EAP-TLS A. Orthogonality
B. PEAP B. Orthodoxy
C. EAP-TTLS
C. Octagonality
D. EAP-FAST
D. Originality
147. What does an SSID represent?
152. What is a standalone computer? (1-4)
A. The logical name of the wireless net-
work A. A computer that is being used as a
B. The type of 802.11 standard in use server
C. The strength of the wireless signal B. A computer that is not connected to a
network
D. The manufacturer of a wireless access
point C. A computer that does not have any pe-
ripherals attached to it
148. Which of the following is NOT a portable
device on a network? D. A computer that is used by only one
person
A. Desktop PC
B. Laptop 153. Which of the choices listed below would
C. Smartphone allow for setting up three Wireless Access
Points (WAPs) on non-overlapping chan-
D. Tablet nels?
E. E-book reader
A. 1
149. Which is a feature of a Mesh Network? B. 5
A. Data can be transmitted from different
C. 6
devices simultaneously
D. 9
B. Devices are dependent on a central
server E. 11
165. Which signaling method breaks data into 170. TDMA stands for:
very small data streams in order to send A. Time Domain Multiple Access
the information across long distances?
B. Time-Division Multiple Access
A. FHSS
C. Tone Division Multiple Access
B. DSSS
D. none of the above
C. OFDM
171. In delivery, the deliverer of the IP
D. CDMA
NARAYAN CHANGDER
packet and the destination are on differ-
ent networks.
166. Which of the following is ordered cor-
rectly in terms of cables bandwidth? A. a connection-oriented
(Highest bandwidth on the left ) B. a direct
A. CoAxial, Fibre Optic, Ethernet C. an indirect
B. Ethernet, CoAxial, Fibre Optic D. none of the above
C. Fibre Optic, Ethernet, CoAxial 172. i am a at home with 3 ipads 2 iphones
D. Fibre Optic, CoAxial, Ethernet and 1 laptop what should i use to connect
them to my network
167. A twisted pair cable that has an alu- A. wired
minum shield inside the plastic jacket that
surrounds the pairs of wires. B. mobile
B. The amount of data that can be trans- B. Homogeneous system used in wire-
ferred in a given time. less
186. Which of the following are examples of 191. What type of key is not shared and com-
client requests? puters cannot decrypt a message without
it?
A. Logging in
A. Free key
B. Printing a document
B. Private key
C. Saving a file to the network
C. Public key
D. Accessing different drives on the net-
work D. Personal key
NARAYAN CHANGDER
E. All of these 192. Increases the strength of wireless signal
A. Access point
187. Which one of these provides security for
wireless networks? B. Client
A. 802.11g C. Wireless Bridge
B. CSMA/CD D. Antenna
C. WAP 193. A small portion of the original file
D. WPA A. Piece
B. Packet
188. The purpose of a SWITCH is
C. Section
A. To allow a computer to connect to the
internet D. Portion
B. To enable devices on a network to con- 194. IDS Stands for
nect with each other and send/receive
A. A-Induction Detection System
data
B. B-Intrusion Detection System
C. To enable one network to connect to
another network C. C-Inspection Detection System
D. To support wireless networking D. D-Illegal Detection System
189. What is a benefit of a wired network 195. Anything that disrupts or modifies a sig-
over a wireless network? nal that is traveling along a wire.
A. crosstalk
A. Increased costs
B. undesired effect
B. Technical Knowledge
C. interference
C. Faster Data Transfer Speeds
D. none of above
D. Easier to hack
196. With which of the following standards is
190. Soft handoff is IEEE 802.11n not backwards compatible?
A. Break before make A. 802.11g
B. Make before make B. 802.11ac
C. Both A and B C. 802.11b
D. None of these D. 802.11a
197. A switch is a faster and more sophis- 202. Routing between autonomous systems is
ticated router. referred to as
198. This is an industry specification that de- 203. Which of the following is not a part of
scribes how mobile phones, computers, characteristic of 4G network?
and PDAs can easily interconnect with each A. Multirate management
other using a short-range wireless connec-
tion. B. Fully converged services
C. Software dependency
A. Bluetooth
D. Diverse user devices
B. EMI
C. D-AMPS 204. Which type of connection is generally
more reliable and quicker?
D. IrDA
A. Wireless (WIFI)
199. Which of the following technology does B. Ethernet (Wired)
not use MIMO?
C. Switch
A. 4G
D. Bandwidth
B. Wifi
C. WiMax 205. Is a wireless media that relatively low
energy and cannot penetrate through
D. AMPS walls or other obstacles. However, it is
commonly used to connect and move data
200. Which two standards support a data rate between devices such as Personal Digital
of 54 Mbps and operates at 5.75 GHz? Assistants (PDAs) and PCs.
(choose TWO)
A. Radio Frequency (RF)
A. 802.11a
B. Bluetooth
B. 802.11b
C. Infrared (IR)
C. 802.11g
D. Micro waves
D. 802.11n
206. A type of fiber optic cable that has a
201. *The ability of increased and expand the larger fiber core capable of carrying mul-
network tiple rays of light.
A. Mobility A. multi-mode
B. Flexibility B. dense fiber optic cable
C. Scalability/Expandability C. high bandwidth fiber
D. Probability D. none of above
207. What frequency band does 802.11ac op- 212. Bluetooth is the wireless technology for
erate at?
A. 5.0 GHz A. Local Area Network
B. 2.4 GHz B. Personal Area Network
C. 5.4 GHz C. Metropolitan Area Network
D. 2.0 GHz D. Wide Area Network
NARAYAN CHANGDER
208. Which options describes a wireless net- 213. In 2007, announced its plan to trans-
work topology in which client devices com- mit its network to 4G standard LTE with
municate directly with each other without joint efforts of Vodafone group.
the use of an Access Point.
A. Verizon Wireless
A. IEEE 802.3af
B. AirTouch
B. Star topology
C. Netflix
C. Ad hoc mode
D. V Cast
D. IEEE 802.3
E. Infrastructure mode 214. What is the domain name?
209. Which organization is responsible for de- A. The domain name identifies the server
veloping LTE standards? that hosts the website.
C. GFSK C. 255
D. BPSK D. 511
211. what is the task of the DNS? 216. What is the name of a database used
mainly that stores information of a sub-
A. translate a domain name into the cor- scriber along with eligible services under
rect IP address roaming or another MSC area?
B. translate an IP address into a domain
A. HLR
name
B. VLR
C. Gives names to websites which aren’t
named C. EIR
D. Leaves websites alone D. AuC
217. A popular category of twisted pair that 222. LEACH is a which type of protocol
supports speed up to 100 Mbps. A. Hierarchical
D. Lot’s of houses connected together 234. Two channels that do not overlap are
with electrical wire used together in an effort to double the
physical data rate.
228. What is a VPN?
A. Multiple Input Multiple Output
A. Virtual Planning Net
B. Dual channeling
B. Visual Procedure Network
C. channel bonding
C. Virtual Private Network
D. none of above
D. Visual Private Net
NARAYAN CHANGDER
229. Bluetooth standard is named after 235. Which network hardware component
must each device have to connect to a net-
A. King Ronaldo Bluetooth work? The component is usually build into
B. Pope Vincent Bluetooth the device.
C. King Herald Bluetooth A. A router
D. Pope Francis Bluetooth B. An Ethernet cable
230. A scatternet can have maximum C. Network Interface Card (NIC)
A. 10 piconets D. none of above
B. 20 piconets 236. Which one of the following wireless
C. 30 piconets transmission types does NOT require a
D. 40 piconets clear LOS to function?
A. Satellite
231. Also known as STA
B. Infrared
A. Access point
C. Wi-Fi
B. Client
C. Wireless Bridge D. WiMAX
239. Which technologies are used by 802.11ac 244. What is the minimum number of devices
to increase network bandwidth? (choose required for a functioning network?
TWO)
240. What is the correct name given to the ca- 245. Which of these is NOT a valid MAC Ad-
ble that can be used to network computers dress?
together? A. gf:98:a1:h5:k4:89
A. VGA B. d5.cf.1e.ef.af.4d
B. HDMI
C. AA:AA:AA:AA:AA:AA
C. Ethernet
D. ab:ab:ab:ab:ab:ab
D. USB
246. Why is packet switching efficient?
241. What is a node?
A. Small packets travel faster
A. A computer
B. A server B. Some cables cannot handle larger
packets
C. A peripheral
C. Each packet is sent down the fastest
D. A tablet or smartphone
route at that time
E. Any device connected to the network
D. none of above
242. MIMO was initially developed in the year
247. Which of these is the correct definition of
A. 1980
a router? (1-4)
B. 1990
A. Forwards data packets along a net-
C. 1985 work
D. 1975 B. Corrects errors that are found in data
packets
243. You’ve just completed a survey of the
wireless signals traversing the airspace in C. A server within a network
your employer’s vicinity, and you’ve found
D. A type of transmission media that pro-
an unauthorized AP with a very strong sig-
vides the greatest bandwidth
nal near the middle of the 100-acre cam-
pus. What kind of threat do you need to
248. What is the nominal range of Bluetooth?
report to your boss?
A. Rogue access point A. 1 Km
B. War driving B. 10 m
C. Bluesnarfing C. 1 m
D. Hidden node D. 10 Km
249. What are the three main parts of a GSM C. 2.4 GHz
Architecture or Structure? D. 5.75 GHz
A. Mobile Station
254. *Which statement is FALSE about wire-
B. BSS-Base Station Subsystem less networks?
C. NSS-Network and Switching Subsys- A. *A. Wireless networks are convenient.
tem
B. *B. Wireless networks are slower
D. All the above than wired LANs.
NARAYAN CHANGDER
250. What network has the server placed in C. *C. Wireless networks use radio trans-
the centre and the devices around it? mitters.
A. Ring D. *D. Wireless networks are faster than
wired networks
B. Bus
C. Star 255. A operates in both the physical and
the data link layer.
D. Mesh
A. router
251. You just settled in for some study time B. bridge
at the local coffee shop, and you pause
long enough to connect your computer to C. repeater
the Wi-Fi so you can listen to some music D. passive hub
while you study. As you’re about to sign
in, you realize you clicked on an SSID called 256. SSID is an abbreviation of:
“Free Coffee and Internet.” What kind of A. See Set Identity
security trap did you almost fall for? B. Set submission Identification
A. Guest network C. nothing
B. Bluejacking D. Service Set Identifier
C. Evil twin
257. Which of these would be the best way to
D. Brute force attack enable manual IP addressing on a SOHO
network?
252. Which of these best describes a wide
area network (WAN)? A. Create a pool of IP address in the wire-
less router
A. A network that covers a small geo-
graphical area. B. Disable DHCP on the wireless router
B. A network that covers a large geo- C. Build a separate DMZ network for all
graphical area. servers
C. A network limited to just one room. D. Configure each device to be in a differ-
ent VLAN
D. none of above
258. Which of the following best describes a
253. What is the frequency of 802.11a net- wide area network?
working?
A. Devices connected together over a
A. 900 MHz small geographical location such as a
B. 1.2 GHz building. These are connected using
268. Which frequencies are defined by 802.11 273. Which of the following is not a character-
for wireless networking? (choose TWO) istic of 3G network?
A. 2.4 GHz A. Communication over VoIP
B. 5.75 GHz B. Unparalleled network capacity
C. 900 MHz C. Multi-megabit Internet access
D. 1.9 GHz D. LTE based network
274. Choose the appropriate wireless bound-
NARAYAN CHANGDER
269. Which of these statements about Clients
and Servers is FALSE? aries”Ron uses his cell phone to view a
web page on the internet‘’
A. Servers sometimes have a ‘failover’
partner as a backup. A. WPAN
B. Servers can authenticate log-ins B. WLAN
C. Clients usually have more storage C. WWAN
space than servers D. WMAN
D. Clients can use software running on 275. Which of these statements about the ad-
servers vantages of networks, are true? (1-4)
270. Which of the following is not a standard A. They enable data to be shared be-
of 3G? tween different users and devices
A. UMTS B. Sending data via a network ensures
that it is safe from viruses
B. Cdma2000
C. Organisations can save money on buy-
C. TD-SCDMA
ing peripherals, as devices can be shared
D. LTE on a network
271. HIPER-LAN stands for D. No additional staff / equipment is
needed
A. High Precision Radio Local Area Net-
work 276. Which network has no centralised man-
B. High Performance Radio Local Area agement of the network, meaning that all
Network devices need their updates and security in-
stalled individually?
C. High Precision Radio Land Area Net-
A. Client server network
work
B. Peer to peer network
D. Huge Performance Radio Link Access
Node C. Both client server and peer to peer
D. none of above
272. Why does the wire inside an Ethernet ca-
ble need to be twisted? 277. Which of the following best describes a
A. To make the inside look nicer local area network?
B. To reduce the chance of interference A. Devices connected together over a
small geographical location such as a
C. To allow the light to travel through building. These are connected using
more quickly wired (Ethernet) or wireless (WiFi) tech-
D. To increase the cost of the cables nologies.
B. Local area networks connected to- “Free Coffee and Internet.” What kind of
gether in different geographical locations. security trap did you almost fall for?
These are connected using telephone
NARAYAN CHANGDER
287. *This is the smallest wireless network B. wireless repeater
used to connect various peripheral devices
C. repeater router
such as mice, keyboards and PDAs to a
computer. All of these devices are dedi- D. none of above
cated to a single host with usually use IR
293. A mechanism used to identify wireless
or Bluetooth technology.
networks.
A. WPAN
A. service set identifier
B. WLAN
B. network name
C. WWAN
C. Network Identifier (NID)
D. WMAN
D. none of above
288. How is data sent to and from a WAP?
294. Which of these are NOT protocols?
A. Tidalwaves
A. ITMAP
B. Microwaves
B. POP
C. Radiowaves
C. HTTPS
D. Babywaves
D. FTP
289. What technology does Bluetooth use to
take advantage of the 79 channels allo- 295. Which network has no dependence on a
cated to the Bluetooth band? server in order to access files, programs
and other resources?
A. ZigBee
A. Client server network
B. DSSS
B. Peer to peer network
C. RTS/CTS
C. Both client server and peer to peer
D. FHSS
D. none of above
290. what does LAN stand for
A. local antenna network 296. What is a Network Interface card?
297. MSC Consists of 303. Which term describes a set of rules that
A. HLR computers on a network use to communi-
cate with one another?
300. The cornerstone of any wireless network B. Computers are connected together us-
is: ing a leased line or a satellite
A. Broadcast point C. Users can share files and peripherals
B. Computer point D. Data can only be transmitted at a very
C. An access point slow rate
D. Transmission point 306. Which network stops all users from being
301. When data are transmitted from device able to login if the main server breaks?
A to device B, the header from A’s layer 4 A. Client server network
is read by B’s layer.
B. Peer to peer network
A. Transport
C. Both client server and peer to peer
B. Application
D. none of above
C. Physical
D. None of the above 307. Which of the following would not be in-
cluded in a data packet?
302. It is considered to be more than one BSS:
A. Source IP address
A. Ad hoc
B. BSS B. Destination address
C. ESS C. MAC address
D. SSID D. Error Checking
308. A degradation of signal as it travels. 313. What is the lowest layer of the OSI
model at which wired and wireless trans-
A. attenuation
missions share the same protocols?
B. degradation
A. Layer 1
C. packet loss
B. Layer 2
D. none of above
C. Layer 3
309. What is the host name part of D. Layer 4
NARAYAN CHANGDER
http://www.google.com?
A. http 314. A is a device that operates only in the
physical layer.
B. www
A. bridge
C. google
B. router
D. .com
C. passive hub
310. What frequencies does Wi-Fi use in the D. repeater
UK?
A. 2.4GHz, 5GHz and 9GHz 315. What is the term used by ITU for a set of
global standards of 3G systems?
B. 2.6GHz, 3.9GHz an
A. IMT 2000
C. 1.2GHz and 5GHz
B. GSM
D. 2.4GHz and 5GHz
C. CDMA
311. broadcasts packets, but creates loops D. EDGE
in the systems.
A. Forwarding 316. Bluetooth operates in which band?
B. Flooding A. Ka Band
C. Backwarding B. L Band
D. none of the above C. Ku Band
D. 2.4 GHz ISM Band
312. Which of the following is not a character-
istic of the 802.11n wireless standard? 317. Which of the following statements is
A. Multiple Input/Multiple Output true?
(MIMO) A. The Internet consists of millions of
B. Operates at both the 2.4 and 5.0 GHz web pages linked together.
ranges B. The Internet is a web page created by
C. Maximum data signaling rate of up to a business.
600 Mbps
C. The WWW consists of millions of web
D. All listed characteristics are correct. pages linked together.
E. At least one of the listed characteris- D. WWW is the unique identity of a web
tics is incorrect or incomplete. page.
328. Which of the following is not a standard 333. Which network is easy to maintain
of WLAN? with no need for expensive hard-
ware/software to set up.
A. HIPER-LAN
A. Client server network
B. HIPERLAN/2
B. Peer to peer network
C. IEEE 802.11b
C. Both client server and peer to peer
D. AMPS
D. none of above
NARAYAN CHANGDER
329. *CBT 2019Which wireless network topol-
ogy allows two laptops to communicate 334. Which of these servers would probably
without using a wireless access point or NOT be found in a school LAN?
router? A. Proxy server
A. *AD hoc mode B. File server
B. *Single point Network C. Print server
C. *Virtual Private Network D. Web server
D. *Infrastructure mode
335. Which of the following factors can affect
330. A is a set of rules that governs data the performance of wireless connections?
communication. A. Range (The distance the device is away
A. protocol from the router)
B. forum B. Interference from other devices
C. standard C. Physical obstructions such as thick
walls.
D. none of the above
D. All of these factors
331. Which of these statements is TRUE about E. All of these factors except the range.
a LAN?
A. A LAN connects computers in a small 336. Disabling SSID broadcasts:
area such as an office or a small site A. Is one of the measures used in the pro-
B. A modem is needed to connect a com- cess of securing wireless networks.
puter to a LAN B. Makes a WLAN harder to discover
C. A LAN consists of only one computer C. Blocks access to a WAP
D. A LAN can connect geographically dis- D. Prevents wireless clients from access
tant sites together the network.
332. IEEE is an abbreviation of: 337. Which of the following is/are essential
A. The Institute of End Effort and Ethical components of a sensor node?
342. What does PAN stand for? Is it: D. They transmit data on ALL ports
NARAYAN CHANGDER
work. C. Checksum of packet data
D. To process requests and respond to D. IEEE 802 network segment index
the client.
355. You can find a LAN at
350. A MAC address is A. School
A. The address of a device on the World B. Home
Wide Web
C. Starbucks
B. The address of a website or server
D. All of them
C. An identifier assigned to a particular
type of device on a network 356. The most common of all copper-based ca-
bles. Has eight wires; they are copper
D. A unique address assigned to a device
conductors that transmit electric signals.
on a network
These eight wires are grouped into four
351. What network covers a LARGE geograph- pairs.
ical area? A. straight through cable
A. LAN B. twisted-pair cable
B. WAN C. RJ-45
C. BAN D. none of above
D. KAN
357. A method in which a wireless bridge is
352. Which of the following describes highly used to connect different 802.11 stan-
directional antenna types used for long- dards.
range, point-to-point bridging links? A. mode switch
A. Yagi antenna B. 802X
B. Omnidirectional antenna C. bridge mode
C. Dipole antenna D. none of above
D. Dish antenna
358. CBT2019*Which IEEE standard covers the
E. Parabolic antenna implementation of wireless Personal Area
Network (PAN)?
353. Radio waves form a part of the elec-
tromagnetic (EMF) spectrum. What else A. 802.11
does? B. 802.03
A. Ordinary light C. 802.05
B. A light bulb D. 802.15
359. A type of wireless encryption used with 365. Which of these is FALSE?
WPA. A. Cloud storage is 100% free
370. Cable television is an example of 376. What is the channel bandwidth of the
A. TDMA IEEE 802.11a standard?
B. FDMA A. 20 MHz
C. CDMA B. 22 MHz
D. SDMA C. 40 MHz
371. Which of these best describes a local area D. 80 MHz
network (LAN)?
NARAYAN CHANGDER
A. A network that covers a small geo- 377. Which network will store all user profiles,
graphical area. paswords and access information in one lo-
B. A network that covers a large geo- cation?
graphical area. A. Client server network
C. A network connected to another net- B. Peer to peer network
work.
C. Both client server and peer to peer
D. none of above
D. none of above
372. *The signal loss its strength because of:
A. Switch 378. Which protocol is responsible for send-
B. Repeater ing/receiving packets on the internet?
C. Interference with other waves A. Http
D. none of above B. Ftp
373. Which 802.11 standard can be used in C. IMAP
both the 2.4-GHz and the 5-GHz bands?
D. TCP/IP
A. 802.11g
B. 802.11n 379. Which antenna would you select to dis-
C. 802.11b perse the radio signals evenly in a 360-
degree pattern?
D. 802.11a
A. Directional
374. Which is a factor in poor network perfor-
mance? B. Omni-directional
A. The number of users C. Multi-directional
B. Standalone machines D. Uni-directional
C. A high network bandwidth
D. A switched off PC 380. IEEE 802.11g is backwards compatible
with which other 802.11 standard(s)?
375. A DNS server
A. 802.11n
A. Is another name for a router
B. 802.11a
B. Is the central server on a typical LAN
C. Looks up IP addresses from URLs C. 802.11b
D. Organises data in packets D. 802.11ac
392. when two nodes that are outside 394. Each Mobile Terminal is identified by a
each other’s range performs simultaneous unique number?
transmission to a node that is within the A. IMEI
range of each of them resulting in a colli-
sion. That means the data from both par- B. SIM
ties A and C will be lost during the colli- C. IMSI
sion.know as D. None
A. Hidden terminal
NARAYAN CHANGDER
395. What is 3GPP?
B. Exposed terminal
A. Project based on W-CDMA
C. Both a and b B. Project based on cdma2000
D. None of the above C. Project based on 2G standards
393. A type of cable that transmits light (pho- D. Project based on 2.5G standards
tons) instead of electricity, and this light
396. Which of the following wireless network
is transmitted over glass or plastic.
topologies contain an access point?
A. coax cable A. Peer-to-Peer topology
B. photon transmission cable B. Ring topology
C. fiber optic cable C. Infrastructure topology
D. none of above D. None of the above
7.1 Introduction
1. Data transmission can transmit data like B. Signalling
A. text, audio C. Data
B. images, video D. Physical Components
C. both a and b
5. What is the major factor that makes coax-
D. none of above ial cable less susceptible to noise than
twisted-pair?
2. When do you use cross over cable? Select
more than 1 answer. A. inner conductor
A. Connect Switch to Router B. diameter of the cable
B. Connect Switch to Switch C. outer conductor
C. Connect Router to Router D. insulating material
D. Connect Host to Host 6. The physical layer is responsible for
3. Transmission type which transmits data A. line coding
one character at a time, with the sender B. channel coding
and receiver not synchronized with each
other is termed as C. modulation
A. synchronous D. all of the mentioned
B. ethernet 7. TCP/IP standards are implemented in the
C. asynchronous software and governed by (a)
D. internet A. IEEE
B. IANA
4. Physical Layer standards address which 3
functional areas? C. IETF
A. Encoding D. ISI
NARAYAN CHANGDER
9. The following are correct statement, EX-
CEPT B. Full Duplex
A. In a copper-based network, the bits in C. Simplex
the form of electrical signals.
D. a and b
B. Transmission media is a communica-
tion channel that carries the information 14. Microwaves are
from the sender to the receiver.
A. omnidirectional
C. Transmission media can be a com-
puter, server, tablet, and mobile phone. B. Unidirectional
D. In a fiber-based network, the bits in C. Bidirectional
the form of light pulses.
D. None of the above
10. It is also known as unbounded otherwise
wireless transmission media. It doesn’t 15. The physical layer is concerned with
require any physical medium to transmit A. bit-by-bit delivery
electromagnetic signals.
B. process to process delivery
A. Transmission Media
C. application to application delivery
B. Guided Media
D. port to port delivery
C. Unguided Media
D. Wired network media 16. In an optical fiber, the inner core is the
cladding.
11. What is the definition of a bandwidth?
A. more dense than
A. the speed at which bits travel on the
network B. less dense than
B. the amount of data that can flow from C. me density as
one place to another in a given amount of
time D. another name for
C. the measure of usable data trans- 17. Radio communication frequencies range
ferred over a given period of time from
D. the speed of bits across the media A. 3 kHz to 300 kHz
over a given period of time
B. 300 kHz to 3 GHz
12. Which data communication method is used
C. 3 KHz to 300 GHz
to transmit the data over a serial commu-
nication link? D. 3 KHz to 3000 GHz
18. Which of the following is not a guided C. roughness of connecting fiber faces
medium?
D. all of the choices
28. Using the Shannon formula to calculate the 33. (a) measures the amount of data that can
data rate for a given channel, if C = B, then flow from one place to another in a given
amount of time. i.e. bits/sec
A. the signal is less than the noise A. Bandwidth
B. the signal is less than the noise B. Latency
C. the signal is equal to the noise C. Throughput
D. not enough information is given to an- D. Goodput
NARAYAN CHANGDER
swer the question
34. Signaling method is how bit values, “1”
29. Which transmission media provides the and “0” are represented on the medium.
highest transmission speed in a network? It varies based on the type of medium used.
A. coaxial cable Which are the mediums?
A. Electrical Signal
B. twisted pair cable
B. Light Signal
C. optical fiber
C. Microwaves
D. electrical cable
D. Ultraviolet
30. Which of the following is not a Unguided
media? 35. What are some of the limitations of wire-
less media? Select more than 1 answer.
A. Radio Wave
A. Effective coverage depending on loca-
B. Micro Wave
tions
C. Satellite
B. Interference-microwave oven, fluores-
D. Infrared cent light
31. Which of the following are characteristics C. Security-anyone can gain access to the
of copper media? Select more than 1 an- transmission
swer. D. Shared medium-many users accessing
A. Cheap results in reduced bandwidth
B. Easy to install E. Safer than UTP cable
C. Limited in distance 36. Which procedure is used to reduce the ef-
D. Cannot be affected by interference fect of crosstalk in copper cables?
A. wrapping the bundle of wires with
32. The Physical layer standards are imple- metallic shielding
mented in hardware and are governed
by many organizations such as Select B. requiring proper grounding connec-
more than 1 from the options. tions
A. ISO C. avoiding sharp bends during installa-
tion
B. EIA/TIA
D. designing a cable infrastructure to
C. ITU-T avoid crosstalk interference
D. ANSI E. twisting opposing circuit wire pairs to-
E. IEEE gether
37. Twisting in a twisted-pair help reduce the 42. The method of communication in which
transaction takes place in both directions,
but only in one direction at a time, is
NARAYAN CHANGDER
B. LED
D. WiMax
C. radio
D. infrared 53. Which transmission media has the highest
transmission speed in a network?
48. are used for cellular phone, satellite,
A. coaxial cable
and wireless LAN communication.
B. twisted pair cable
A. Radio Waves
B. Micro Waves C. optical fiber
50. What are TRUE about the Physical Layer? 55. In an environment with many high-voltage
Select 3 from the options. devices, the best transmission medium
A. Accepts frame from the Data Link layer would be
and encodes it as a series of signals to A. twisted-pair cable
transmit
B. coaxial cable
B. Transports bits across the network me-
dia C. optical fiber
C. It is the 2nd layer in the OSI reference D. the atmosphere
model
56. What are the three different types of mul-
D. It is the 1st layer in the OSI reference
tiplexing?
model
A. TDMA, FDMA, CDMA
51. Which media uses patterns of light to rep-
resent bits? B. TDAM, FDMA, SDMA
A. copper C. TDD, FDMA, CDMA
B. wireless D. FDD, TDD, TDMA
67. In fiber optics, the signal is waves. B. Because UTP counters Crosstalk by
A. light twisting and placing the cables close to-
gether
B. radio
C. None of them
C. infrared
D. none of above
D. very low frequency
73. Why are two strands of fiber used for sin-
68. (a) converts the stream of bits into a for- gle fiber optic connection?
NARAYAN CHANGDER
mat that can be recognized by the next de- A. The two strands allow the data to
vice in the network path. travel for longer distances without de-
A. Encoding grading.
B. Encapsulation B. They increase the speed at which the
data can travel.
C. De-Encapsulation
C. They prevent crosstalk from causing
D. Decoding interference on the connection.
69. Channel capacity unit is: D. They allow for full-duplex connectivity.
A. bit / symbol 74. This kind of transmission media is also
B. symbol / bit known as wired otherwise bounded me-
dia.
C. bit / sec
A. Transmission Media
D. sec / bit
B. Guided Media
70. Which of the following is an advantage to C. Wireless network media
using fiber optics data transmission?
D. Unguided Media
A. resistance to data theft
75. Which of the following is NOT a feature of
B. fast data transmission rate Guided Media?
C. low noise level A. High Speed
D. all of above B. Secure
71. are used for cellular phone, satellite, C. Used for comparatively shorter dis-
and wireless LAN communications.A) B) In- tances.
frared waves D. The signal is broadcasted through air
A. Radio waves 76. Transmission media directly controlled by
B. Infrared waves A. Physical Layer
C. Microwaves B. Data Link Layer
D. none of the above C. Transport Layer
72. Why UTP cable does not use shielding to D. Network Layer
counter the effects of EMI and RFI? 77. Which type of cable connection would be
A. Because UTP cable is auto immune to used in Packet Tracer to connect a FastEth-
EMI and RFI. ernet port on a PC to a switch port?
88. Which of these is the name for the capacity 93. Which of the following are properties of
of a medium to carry data? Fiber-Optic cabling? Select more than 1
option.
A. bandwidth
A. More expensive than UTP cable
B. throughput
B. Transmit over longer distance at
C. goodput amount of time, including de-
higher bandwidth
lays, for data to travel from one given
point to another. measure of the trans- C. Less susceptible to attenuation
NARAYAN CHANGDER
fer of bits across the media over a given D. Immune to RFI, EMI
period of time. measure of usable data
transferred over a given period of time E. Use electrical signal to transmit data
D. none of above 94. Which of the following primarily uses
guided media?
89. What does UTP stands for?
A. cellular telephone system
A. Unshielded Twisted pair
B. local telephone system
B. Uniformly twisted pair
C. satellite communications
C. Unshielded Connecter pair
D. radio broadcasting
D. None
95. The physical layer translates logical com-
90. Which of the following performs modula- munication requests from the into
tion and demodulation? hardware specific operations.
A. fiber optics A. network layer
B. switch B. data link layer
C. modulator C. transport layer
D. modem D. application layer
91. When we talk about unguided media, usu- 96. The following are the factors you need to
ally we are referring to consider in selecting the right type of me-
A. metallic wires dia, EXCEPT
98. Which of the following to be considered as 103. In electromagnetic spectrum for wireless
a broadband communication? communication, reserved range for Radio
waves and microwaves is known as
101. Which type of UTP cable is used to con- D. None of the above
nect a PC to a switch port? 107. Which of the following communication
A. crossover modes support two-way traffic but in only
one direction at a time?
B. rollover
A. simplex
C. console
B. half duplex
D. straight-through
C. three-quarters duplex
102. Which wireless technology is used on D. none of the above
smart phones to transmit data to another
108. Which of these is a measure of the trans-
device within only very close proximity?
fer of bit across the media?
A. NFC A. bandwidth
B. Wi-Fi B. throughput
C. 3G/4G C. goodput
D. Bluetooth D. none of above
109. A network administrator is designing 114. Smoke signals are an example of commu-
a new network infrastructure that in- nication through
cludes both wired and wireless connectiv- A. a guided medium
ity.Under which situation would a wire-
less connection be recommended? B. an unguided medium
A. The end-user device only has an Ether- C. a refractive medium
net NIC D. a small or large medium
B. The end-user device area has a high
NARAYAN CHANGDER
concentration of RFI 115. What is one advantage of using fiber op-
tic cabling rather than copper cabling?
C. The end-user device requires a dedi-
cated connection because of performance A. It is easier to terminate and install
requirements than copper cabling
D. The end-user device needs mobility B. It is able to be installed around sharp
when connecting to the network. bends
110. The RG number gives us information C. It is able to carry signals much farther
about than copper cabling
A. twisted pairs D. It is usually cheaper than copper ca-
B. coaxial cables bling
C. optical fibers 116. The capacity of the medium to carry data
D. radio governance is known as
NARAYAN CHANGDER
A. Frequency C. Modulation
B. Bandwidth D. Digitization
NARAYAN CHANGDER
nal element belonging to a four-level sig-
but not at the same time. When one device nal
is sending, the other can only receive, and B. the 2-bit patterns encoded as one sig-
vice-versa. nal element belonging to a four-level sig-
A. Simplex nal
B. Half-Duplex C. the 2-bit patterns encoded as one sig-
C. Full-Duplex nal element belonging to a two-level sig-
nal
D. Answer NOT given
D. the 4-bit patterns encoded as one sig-
22. transmission enables moving data bit nal element belonging to a two-level sig-
by bit nal
A. Full duplex
27. In encoding, the transional show at bit
B. Asynchronous 0.
C. Parallel A. NRZ
D. Serial B. manchester
23. Popular forms of information include text, C. Differential Manchester
pictures, audio, video etc.
D. RZ
A. Message
B. Sender 28. uses 1 cable to send and 1 cable to
receive. The signal uses the mode to
C. Receiver transfer the data. (Choose 2 answers)
D. Transmission Media A. Baseband
E. Protocol
B. Broadband
24. Line coding schemes are C. Simple Mode
A. unipolar D. Simplex Mode
B. polar E. Half-Duplex Mode
C. bipolar
29. List the techniques in serial transmission
D. semipolar
A. synchronous
25. In phase shift keying, the of the carrier
B. Asynchronous
is varied to represent two or more differ-
ent signal elements. C. isochronous
A. Amplitude D. misochronous
30. The data rate defines the number of bits 32. Analog signal transmit data through a tech-
sent per sec-bps. It is often referred to nique called
the
NARAYAN CHANGDER
D. Amplitude A. Death period
2. Multiplexing is used in B. Poison period
A. Packet switching C. Silent period
B. Circuit switching D. Stop period
C. Data switching 8. Synchronous Time-Division Multiplexing
D. Packet & Circuit switching (TDM) is not efficient because of
A. higher data rate
3. Which multiplexing technique used to
transmit digital signals? B. infinite frames
A. FDM C. empty slots
B. TDM D. Both A and C
B. 3m D. 2m-1
C. 2m
NARAYAN CHANGDER
A. data communication media
6. Below are the advantages of a network
B. network topology except
C. data flow A. Information security
D. advantages of using a network. B. Transferring hardware
2. Definition of a network is C. Sharing hardware
A. Collection of data and information D. Data backup
B. Collection of computer and software c 7. Which type of transmission media requires
C. Collection of computer connected to- a physical path between devices?
gether via communication devices and A. Guided transmission media
transmission media
B. Wireless transmission media
D. Collection of computer and devices
connected together via communications C. Digital transmission media
devices and transmission media D. Optical transmission media
3. This type of twisted pair cable is a cabling 8. State TWO types of transmission media:
that consists of one or more insulated wire A. Protocol
pairs encased in a plastic sheath.
B. Guided
A. STP
C. Unguided
B. UTP
D. Algorithma
C. Cat 6
D. STPO 9. cables are mainly used on cable televi-
sion
4. The computer or device that is used for A. Foil shielded cable
sending data is called
B. Coaxial cable
A. Sender
C. Twisted pair cable
B. Reciever
D. Fiber optic cable
C. Manager
D. Follower 10. This type of twisted pair cable consists of
twisted pair wires that are not only indi-
5. The conversion from digital signals to ana- vidually insulated but also surrounded by
log signals and vice versa is called a shielding made of foil.
A. Modem/Demodem A. STPO
B. Modulation/Demodulation B. STP
B. Modem D. WI-FI
14. Fibre optic cables consist of very fine 19. The type of propagation used in radio com-
strands of glass or plastic fibre; transmit- munication is highly dependent on the
ting data via of the signal
A. magnetic pulses A. data rate
B. light pulses B. frequency
C. electricity C. baud rate
D. none of above D. power
15. Which transmission media has “up to 1 20. The 2.4 Ghz frequency range is divided
Gbps” bandwidth? into
A. Copper (Ethernet) A. 12 Channels
B. Fibre Optic B. 13 Channels
C. Wireless C. 14 Channels
D. none of above D. 15 Channels
21. The core of the optical fibre is 27. What are the different types of wired
transmission media
A. opaque and conducting material.
A. Coaxial cable Twisted pair Fiber-optic
B. opaque and dielectric material.
cable
C. transparent and conducting material. B. Satellite
D. transparent and dielectric material. C. Narrow band
22. Bandwidth NOT measured in: D. Broad band
NARAYAN CHANGDER
A. Mbps 28. Each wire is protected with plastic wrap,
Which wire is described above
B. Hbps
A. Twisted pair
C. Kbps
B. Universal trigger point
D. Gbps
C. Unshielded twisted pair
23. Why do users sometimes want to change D. Universal serial bus
the frequency channel of the Wireless de-
vice? 29. What type of cable is commonly used for
cable television?
A. To make it louder
A. Fiber-Optic Cable
B. To prevent interference
B. Coaxial Cable
C. To make it quieter
C. Twisted-Pair Cable
D. To choose their favourite channel
D. Microwave Transmission
24. we connect to wifi using 30. A system of conductors used to convey
A. electrical signals electric power or signal between two or
more points
B. radio signals
A. Channels
C. light signals
B. Optical cables
D. none of above
C. Transmission lines
25. Choose types of transmission mode TRUE: D. Waveguides
A. Highway 31. Optical fibre based on the principle of
B. Simplex A. total internal reflection.
C. Half-Duplex B. total internal refraction.
D. Full-Duplex C. diffraction.
D. interference.
26. What is guided transmission media?
A. A type of computer network 32. Propagation time is proportional to dis-
tance and proportional to propaganda
B. A physical connection between devices speed.
C. A communication technology A. inversely; directly
D. A form of wireless communication B. directly; inversely
44. What is the most common type of guided C. Full Duplex Connection
transmission media? D. All above
A. Fiber-Optic Cable
50. The abbreviation STP stands for:
B. Coaxial Cable
A. Shielded Twisted Pair
C. Twisted-Pair Cable
D. Microwave Transmission B. Straight Through Process
C. Single Topology Protocol
45. What are two types of Twisted Pair? (Se-
NARAYAN CHANGDER
lect two answers) D. Shave Time Pair
A. Broadband 51. Which transmission media has “up to 600
B. Shielded Twisted Pair Mbps” bandwidth?
C. Fiber Optic A. Copper (Ethernet)
D. Unshielded Twisted Pair B. Fibre Optic
46. Which type of transmission media doesn’t C. Wireless
require a physical connection between de- D. none of above
vices?
A. Guided transmission media 52. What is data communication?
NARAYAN CHANGDER
8.1 Introduction
1. What term describes a slideshow that C. SVG
plays continuously?
D. Raster
A. Looping
B. Neverending 5. To convert a conventional image to a digi-
tal image, is used.
C. Cycling
A. computer
D. Autoplaying
B. scanner
2. the combined use of different types of me-
dia C. camera
A. enhance D. speaker
B. analyze
6. control how the presentation changes
C. multimediamultimedia from one slide to the next.
D. illustrations A. Animations
3. The images is in so you can look at it B. Transitions
from all sides.
C. Backgrounds
A. application
D. Theme
B. integrated
C. related 7. Which feature can you use to present
slides automatically in a slide show?
D. 3-D
A. Animations
4. Which type of image file is constructed by
a series of pixels to form an image? B. Slide layouts
A. PDF C. Templates
B. Vector D. Timings
8. Projects have (select all that apply) 13. Which of the following statements is TRUE
A. vague goals about the text media element?
A. Universal Product Code 16. The extended Gap model of service quality
B. Voice recognition system identifies how many gaps?
A. 5
C. Cathode-ray tube
B. 6
D. none of above
C. 7
12. Cassie wants to remove a dead tree in
D. 8
the background of a picture. Which image
editing feature permits her to retouch the 17. You must consider this when choosing the
photo? format for multimedia projects.
A. Aspect ratio A. Information and Audience
B. Cloning B. Command Key
C. Filtering C. Age and Purpose
D. Rotating D. Video Games
NARAYAN CHANGDER
C. Portability
A. Spreadsheets
D. Transparency
B. Slide show creation
19. All the links in tis e-zine are to football C. Word processing
A. simulation D. Digital photo editing
B. integrated
24. buying and selling of products or ser-
C. 3D vices over electronic systems such as the
D. related Internet and other computer networks and
it also consists of the exchange of data
20. Gilah is creating a graphic that will be to facilitate the financing and payment as-
used on her school’s Web site, in newslet- pects of business transactions
ters, and on sports uniforms. She needs
A. Internet banking
to choose an image file format that will
not lose quality when the image is resized. B. Online Service
Which graphic format should Gilah use? C. E-commerce
A. GIF D. Online Seller
B. Vector
25. The concept of quality requires a business
C. Raster to:
D. JPEG A. Produce goods that are better than the
competition
21. The width of the bandwidth in the network
or the consumption value of data transfers B. Produce goods that are reasonably
used between client and server devices priced
within a certain time, where the value is C. Provide services that are fit for pru-
calculated in units of bits (bits per second) pose
is the meaning of D. Provide services that are value for
A. VPS money? Increased costs from products
B. Bandwidth that do not meet standards
C. Throughput 26. Which of the following statements is true
D. analog signal regarding cropping or resizing an image in
graphic editing software?
E. Digital signal
A. Resizing an image deletes the unused
22. What are the two types of views in portion of the image.
Google Web Designer? B. Cropping an image keeps the unused
A. Panel portion of the image.
C. Resizing an image does not reduce its 32. what is a whole bunch of images being
file size. shown to us quickly
30. In the past, Web pages used text and 35. Layla is creating a presentation to high-
graphics. light her company’s latest product. She
would like to add the company log and con-
A. static
tact information to each slide. Which op-
B. dynamic tion should Layla use to automatically add
C. hypermedia these elements to all of the slides in the
presentation?
D. link
A. Master panel
31. the effective data transfer rate (rate) B. Slide template master
which is measured in bits per second is the
meaning of C. Slide master
D. Slide layout master
A. downlink rate
B. uplink rate 36. What is multimedia?
C. Throughput A. A field concerned with the use or pro-
cessing of multiple types of data such as
D. transfer rate audio, text, images to represent informa-
E. bandwidth tion.
B. A field concerned with the use or pro- 41. You have created a slide with an image of
cessing of multiple types of data such as waves and small boat. You would like the
audio, video, text, images to represent in- boat to appear sailing on the water, with
formation. waves along its side. Which of the follow-
C. A field concerned with the use or pro- ing will achieve that effect when you se-
cessing of multiple types of data such as lect the boat?
audio, video, text to represent informa- A. Send backward
tion. B. Send forward
NARAYAN CHANGDER
D. A field concerned with the use or pro- C. Keep back
cessing of multiple types of data such as
video, text, images to represent informa- D. Bring forward
tion. 42. According to the planning and costing
37. File format extension for animation is stages, three elements can vary in project
estimates. What are they?
A. *.png
A. Computers, climate, and pressure
B. *.jpg
B. Time, money, andpeople
C. *.gif
C. Permissions, workflow, and data
D. *.pdf
D. Age, class, anddomain
38. Yuki is creating a memory book for her 43. A multimedia project such as games and
friend’s birthday. Which file type should educational materials should consider fea-
she use to print the pictures? tures below (select all that apply)
A. SVG A. multi-platform and multi operating sys-
B. DRW tems
C. Raster B. single or multi user and user sign-in
D. Vector C. database
D. rewards and scoring
39. Which program is an example of graphics
editing software? E. personalized experience
A. Google Slides 44. Which of the following is NOT an advan-
B. Google Docs tage of a vector graphic?
B. a lower resolution for smaller file size. 50. a high level programming language de-
signed to reduce the complexity and
C. a higher resolution to display on a mon-
amount of source code required to create
NARAYAN CHANGDER
D. animation 60. Which model is the only QoS model with
no mechanism to classify packets?
56. defined as variation of delay or variation
of packet arrival time is a QoS parameter A. IntServ
A. Rate B. DiffServ
B. Jitter C. best-effort
C. Latency D. hard QoS
58. Which image format would be most likely 62. Briefly describe the purpose of audio to in-
used for a photo directory in web or print crease the understanding of complex con-
publishing? tents through audio explanation
A. SVG A. The use of voice in WAZE helps driver
to focus on the driving by looking to the
B. DRW
map only
C. AI B. The use of voice in WAZE helps driver
D. PNG to focus on the driving while listening to
the direction given by the WAZE without
59. Dina is responsible for creating presen- looking to the map only
tations which different employees of her
company will use in different parts of the C. Sound effect such as crying sound will
country. What’s the most efficient way help the audience to understand the illus-
for Dina to be sure each employee has all tration captured from the drama or movie
the details he or she needs in their presen- D. Sound effect such as crying sound will
tation, without adding too much detail to helps the audience to understand caption
the slides themselves? captured from the drama or movie
63. To show a video in Google Slides (but not 68. VoIP-based applications that can be used
needed for PowerPoint), you must first up- on PCs/Laptops are
load your video to:
65. State a purpose of using text in multime- 70. There are 4 basic types of image. They
dia production. are:
A. To present information more attrac- A. Binary, Greyscale, True colour, Red-
tively. green-blue (RGB)
B. Can help organize thoughts and illus- B. Greyscale, True colour, Red-green-
trate processes blue (RGB), Indexed
C. To provide information C. Binary, Greyscale, True colour, Red-
green-blue (RGB)
D. To communicate ideas, thoughts, and
facts. D. Binary, Greyscale, True colour or red-
green-blue (RGB), Indexed.
66. Dennis has saved a photograph and has
lost data during compression. What type 71. How will you use multimedia for effective
of compression has occurred? learning?
A. Lossy A. creating learning activities
B. Lossless B. use clear and concise sentences
C. Resolution C. be aware of your visual quality
D. Color Mode D. multimedia content helps to vary and
enhance the learning process, and leads
67. a system for connecting computers into to better knowledge retention
networks (= groups of computers that are
used together) 72. Which option is used as a filter?
A. LANs A. Crop
B. WANs B. Resize
C. Ethernet C. Brighten
D. Wifi D. Dry brush
73. Here is the function of the firewall namely 77. The Charlotte Knight’s have opened up a
new stadium. Their logo needs to be re
sized to fit on flyers, posters, and bill-
A. The link between 2 different networks
boards. To maintain the graphic quality
B. Manage and control network traffic when scaled the logo should be created as
C. Connecting between 2 networks to the a:
internet using 1 IP A. JPEG Graphic
D. Programs that make requests for con- B. PNG Graphic
NARAYAN CHANGDER
tent from the internet/intranet C. Vector Graphic
74. You want each slide in your presentation D. Raster Graphic
to have a colored shape in the top-left cor-
78. Below are the reasons we need compres-
ner that contains an image. You intend to
sion, except:
use a different image on each slide, but
you want to use the same size and color A. Multimedia data is good in quality.
shape for all images. Which method is the B. Limited network bandwidth.
most efficient way for you to do this?
C. Limited storage space.
A. Add the shape and set the color using D. Increasing resolution, sampling rate,
a pre-designed presentation template. more bits per pixel, will help improve me-
B. Create each shape and image in a dia quality at the expense of increasing
graphics program and then insert the de- media size.
sired image into each slide.
79. Which choice lists two image formats that
C. Create a shape containing an image, support transparency?
and then copy and paste it into each slide.
A. GIF and PNG
D. Add the shape and set the color using
B. TIFF and JPEG
the slide master.
C. PNG and TIFF
75. Bobby has saved a photograph without D. JPEG and GIF
losing data. What type of compression has
occurred? 80. A video consists of a sequence of
A. Lossy A. Frames
B. Lossless B. Signals
C. Resolution C. Packets
D. Slots
D. Color Mode
81. Which QoS model uses the DSCP bit to
76. Which of the following is an example of an mark packets and provides 64 possible
editing tool? service classes to use?
A. Lasso A. Intserv
B. Clone Stamp B. FIFO
C. Blur C. best-effort
D. Zoom D. DiffServ
B. Video does not capture abstract con- A. consists of those processes per-
cept such as molecule atom and electron formed to observe project execution so
that potential problems can be identified
C. Video is a realistic moving images in a timely manner and corrective action
while abstract concept is realistic in visu- can be taken
ally but not realistic ideally
B. includes planning of time, cost and re-
D. Video is not a realistic moving images sources adequately to estimate the work
while abstract concept is not realistic in needed and to effectively manage risk dur-
visually but realistic ideally ing project execution
83. Which of the following is a raster graphics C. involves coordinating people and re-
format sources, as well as integrating and per-
forming the activities of the project in ac-
A. SVG
cordance with the project management
B. JPG plan.
C. PPI D. determines the nature and scope of
D. DPI the project
84. connects a word or phrase to another 88. Which type of traffic does Cisco recom-
screen in a multimedia program. mend be placed in the strict priority queue
(PQ) when low latency queuing (LLQ) is be-
A. Hypermedia
ing used?
B. Linear interactivity
A. video
C. Non-Linear interactivity
B. data
D. Hypertext
C. voice
85. Project management is a of principles, D. management
, procedures and practices used to en-
sure the “projects” are completed on , 89. the configuration action on NAT that func-
on budget and as required tions to configure with the aim of changing
a private IP to a public IP is
A. perception, methodologies, time
A. accept
B. major, hardware, schedule
B. dst-nat
C. matter, software, schedule
C. Masquerade
D. set, methodologies, time
D. Redirect
86. Ed is creating a poster to promote the up-
coming 5K race. He needs to align objects 90. Vector graphics are:
with the edges or center point of other ob- A. resolution-dependent
jects. Ed should use: B. made up of pixels
A. Smart Guides C. not able to be resized without losing
B. Stacking Order quality
NARAYAN CHANGDER
D. 54 Mb/s D. looklan.
E. 100 Mb/s E. host.
92. Trevor is creating an image that will be 97. In project management, WBS is an
used in varying sizes so it needs to be acronym to
saved in a format that will allow him to A. World Business Structure
scale it without altering the quality. Which
image type should he create? B. Wireless Business System
A. Raster graphics C. Work Breakdown Structure
B. Vector graphics D. Work Based System
C. JPEG 98. A type of audio in which the computer in-
D. Lossy graphics terprets notes
93. DHCP Pools is A. AAC
A. Contains a list of leased IP addresses B. MP3
B. Contains the time limit for leasing the C. MIDI
IP Address D. WAV
C. Berisi IP address Client
99. Protocols that are at the transport layer
D. Contains the IP address of the router
and have functions used in HTTP, HTTPS
94. for example, the bandwidth you have is applications. SMPT. FTP, SSH are..
64 kbps then you want to download a file A. tcp
from the internet that is 128 kb in size,
how long does it take to download B. udp
A. 1 second C. icmp
B. 2 sec D. ggp
C. 3 sec E. ipconfig
D. 4 sec 100. Which of the following tools can be used
95. What are the advantages of multimedia? to analyze service quality problems?
A. human interface usability requirement A. Blueprinting
B. host computing power requirement B. TQM
C. enhances personal communication C. ISO 9000
D. network latency D. All of the above
101. A combination of and entertainment 106. Main processes involved in project time
makes learning enjoyable in schools. management include (select all that ap-
ply)
111. a network of computers interconnected 116. James is drawing circles that are all filled
over large distances, often by optical fi- with a pattern. He wants to change the
bres or microwave communications. pattern to a solid fill. Which type of graph-
ics is he editing?
A. LANs
A. Raster Graphics
B. WANs
B. JPEG Graphics
C. Ethernet
C. TIFF Graphics
D. ISP
NARAYAN CHANGDER
D. Vector Graphics
112. Streaming stored audio/video, files are
compressed and stored on a 117. one of the simplest bandwidth manage-
ment
A. Server
A. cake tree
B. Domain
B. shared/up to
C. Internet
C. single queue
D. IP
D. delay pools
113. a type of television that shows clear, E. pcq
high-quality pictures on a wider screen
than standard television 118. An attack method using malicious code by
A. High Definition TV inserting viruses, worms or trojan horses
is a logical attack called
B. Blu-ray
A. SQL Injection
C. Optical character recognition
B. Request Flooding
D. Universal Product Code
C. Social Engineering
114. Which QoS model is most resource inten- D. Malicious Code
sive and provides the highest QoS guaran-
E. Packet Sniffer
tee?
A. Soft QoS 119. video cameras can transfer video
clips directly to the computer for editing.
B. Intserv
A. Profesional
C. DiffServ
B. Digital
D. best effort
C. Analogue
115. According to the Gap model of service D. Portable
quality, “not having the right service de-
sign & standards” is 120. What is Mrs. Thompson’s Snail’s name?
A. Gap 1 A. Slow Down
B. Gap 2 B. Hippie
C. Gap 3 C. Smiley
D. Gap 4 D. Warp Drive
121. The menu on Winbox that is used to man- 126. Max is working on a diagram to show
age bandwidth is.. the upcoming weather patterns. To place
the sun behind the cloud he needs to adjust
125. Ms. Osteen gives her class an assign- 130. “Newspaper is not a multimedia product”
ment to insert background color that grad- Do you agree with the statement above?
ually changes from blue to green. To ac- Justify your answer in with a support from
complish this design effect the students any definition you know.
must add a: A. Yes. Newspaper is one the multime-
A. Pattern dia product based on the definition which
“multimedia is the use of text, graphic to
B. Fill
convey information”
C. Swatch
B. No. Multimedia is any combination of
D. Gradient text, graphics, sound, animation and video
delivered to you by computer or other 135. The work tool used to determine how
electronic or digitally manipulated means. strong the power of the light signal that
C. Disagree . Multimedia is any combi- has entered the fiber optic cable is
nation of text, graphics, sound, animation A. fusion splicer
and video delivered to you by computer or
B. stripper/miller
other electronic or digitally manipulated
means. C. cleaver
D. Agree. Multimedia is any combina- D. Optical Power Meter (OPM)
NARAYAN CHANGDER
tion of text, graphics, sound, animation
E. Optical Time Domain Reflectometer
and video delivered to you by computer or
(OTDR)
other electronic or digitally manipulated
means. 136. Which of the four navigational structures
allows users to freely navigate through
131. is a horizontal bar chart with a list of
the content of the project, unbound by pre-
activities on the left and a timeline on the
determined routes?
horizontal axis.
A. PERT chart A. Hierarchical
132. What could this be an example of to 137. This file format supports transparency
help color images 11111111 00000000 but does not support animation.
00000000 A. PNG
A. MIDI
B. TIFF
B. RGB
C. EPS
C. binary
D. SVG
D. none of above
138. Crucial determinants of multimedia con-
133. Sound Forge is an example of editors. tent are (select all that apply)
A. text
A. objective of the application
B. graphic
B. cost and rights
C. audio
C. creation of assets breakdown
D. video
D. disc space
134. If frames are displayed on screen fast
enough, we get an impression of 139. When was multimedia more popular?
A. Signals A. 1970’s
B. Motions B. 1980’s
C. Packets C. 1990’s
D. Bits D. 2000’s
B. Gap 2 A. JPEG
B. Raster
C. Gap 3
C. PNG
D. Gap 5
D. Vector
142. The following are three types of Video
147. Anahi is creating a graphic that will be
Camera except
used on her company’s Web site, in print
A. Professional Video Camera materials, in advertising and on uniforms.
She needs to choose an image file format
B. Digital Camera
that will not lose quality when the image
C. Compact Digital Camera is resized. Which graphic format should
D. Camcorder Anahi use?
A. Raster
143. A protocol at the transport layer that is B. Bitmap
connection oriented and reliable but has a
high data transfer delay is C. TIFF
A. FTP D. Vector
NARAYAN CHANGDER
using DiffServ.
A. JPEG Graphic
C. Data is not forwarded along the path-
B. PNG Graphic way.
C. Vector Graphic
D. Data is forwarded along the pathway
D. Raster Graphic using IntServ but not provided preferen-
151. A network administrator at that time tial treatment.
wanted to configure by equalizing the time
154. Which slideshow tool is used to automat-
of each computer to connect to the server
ically apply changes to all of the slides in
computer network or commonly referred
a presentation?
to as the NTP server. And by using the
NTP server protocol, what communication A. Slide panel
port connection is suitable for use?
B. Slide layout
A. UDP port number 110
C. Slide thumbnail
B. TCP port number 114
C. UDP port number 123 D. Slide master
D. D. UDP port number 143 155. What term describes images that are
E. E. Port TCP name 123 made up of pixels and cannot be resized
without losing quality?
152. All the following questions are true about
system functions except A. DPI
A. Knowledge Management System B. Opaque
(KMS) to predict the weather and observe
C. Vector
what happening to surrounding
B. Geographical Information Systems D. Raster
(GIS) to select the suitable land for the
crop to plant 156. Valerie is creating images to include on
her company website. The compression
C. Decision Support System (DSS) to help type she is using reduces the file size with-
decision makers compile useful informa- out deleting any of the image data. Which
tion from a combination of raw data, doc- type of compression is she using?
uments, and personal knowledge, or busi-
ness models to identify and solve prob- A. lossless
lems and make decisions B. lossy
D. network tool such as mobile phone, ra-
C. portable
dio and wireless network to promote your
product or contact with the buyer D. transparent
157. Companies nowadays make multimedia 162. The ‘People’ element of services leads to
to promote their products. which gap?
B. mangle A. switch
C. qos B. router
D. bandwidth C. firewall
E. ip → queues D. ip phone
167. John has chosen several graphics for his 172. While editing an image, Lucy clicked on
webpage promoting the local farmers mar- one of the image handles and dragged it
ket. He wants to ensurethat customers to the right in order to change the display
are able to view the graphics immediately. size of the image. This caused the image
Why is vector the preferred format for his to be distorted. Which of the following did
graphics? she change?
A. Small file size and loads quickly A. Aspect ratio
B. Large file size and loads quickly B. Color Depth
NARAYAN CHANGDER
C. Can be edited in draw programs C. Transparency
D. Can be time consuming to create D. Rotation
168. The total of estimated hours for each task 173. In interactivity, the user does not
times your hourly billing rate is presented have the freedom to view the content they
in want.
A. budget A. linear
B. milestones B. non-linear
C. proposal C. text
NARAYAN CHANGDER
using too much text on your slides? B. delete switch 1 configuration
C. 3 x 3 E. allowed vlan
C. Can prevent all kinds of cyber crime at- D. Plasma poster-Multimedia will be-
tacks come available at stand-alone terminals
or kiosks to provide information and help
D. Is a network security that uses the
IEEE standard 193. Project execution is also known as
phase.
189. Chrome, Safari, Firefox and Internet Ex-
plorer are all examples of? A. closing
A. Browsers B. planning
B. Interpreters C. initiation
C. Compilers D. implementation
206. A network engineer performs a ping test 210. Provides services to user applications.
and receives a value indicating the time it This layer is responsible for exchanging
takes for a packet to travel from source to information between computer programs,
destination device and back. What value such as e-mail programs, and other ser-
is appropriate to describe the illustration vices running on the network, such as
above? printer servers or other computer applica-
A. Bandwidth tions.
A. Presentation Layer
B. Jitter
NARAYAN CHANGDER
B. Session Layer
C. Latency
C. Application Layer
D. Priority
D. Transport Layer
207. Building a simple wireless computer net-
E. Network Layer
work at home and in a small office is quite
easy to do with the availability of various 211. The following parameters in QoS related
kinds of network devices, especially wire- to the average speed of the network in
less routers that are already integrated sending packets to the destination address
with modems. are
A. create a user profile and password A. Delay
B. create firewalls B. Jitter
C. create dhcp C. Throughput
D. create security profiles D. Network Access
E. fill ip statically 212. is not a multimedia element
208. If the IP number is not recognized in the A. Text
network, a message will appear? B. Data
A. Time to Leave C. Image
B. Time for Love D. Video
C. Time With you
213. The trunk switch works for
D. Request Time Output
A. Set internet connection
E. Request time Out
B. Connecting the same vlan with differ-
209. What is an disadvantage of a bitmapped ent switches
image? C. Set switch ports
A. They don’t look as realistic as vector D. Adding a new host
graphics.
214. Jamel wants to apply formatting to the
B. They are not as colourful.
placeholders in her slide presentation so
C. They have a small file size that they are consistent throughout the
D. They have a large file size because in- presentation. What should she use to ac-
formation has to be stored about every complish this?
pixel A. Slide layouts
NARAYAN CHANGDER
225. What program is needed to view web 230. “ font is what you use, and typeface
pages? is what you see.” Differentiate serif and
A. Browser Sans serif
B. Interpreter A. Sans Serif is Typeface that have
C. Compiler line/curve at the end of the character.
Serif is Typeface that does not have line/
D. Web Authoring Software curve at the end of the character.
226. Which raster image format produces a B. Serif is the type of writing whereas
large file size that does not lose quality, sans serif is the style of writing.
and is best used when saving photographs C. Serif is Typeface that have line/curve
for print? at the end of the character. San serif is
A. PSD Typeface that does not have line/ curve at
B. GIF the end of the character.
C. PNG D. Sans serif is the type of writing
whereas serif is the type of writing.
D. TIFF
231. What functionality is needed in a router
227. How many levels of priority are possible
to provide remote workers with VoIP and
when using class of service (CoS) marking
video conferencing capabilities?
on frames?
A. IPSec
A. 3
B. 8 B. QoS
C. 24 C. PPPoE
D. 64 D. VPN
228. Tom has created a vector graphic of a bas- 232. Which of the following is the field con-
ketball to put on his webpage. Regardless cerned with the computer controlled inte-
of how much the graphic is enlarged or re- gration of text, graphics still and moving
duced, the graphic definition and quality re- images, animation, sounds and any other
main the same. This graphic is: medium?
A. Resolution Independent A. Multimedia
B. Resolution Dependent B. Digital Multimedia
C. Lossy C. Multi Media System
D. Pixelated D. Digital Animation
NARAYAN CHANGDER
C. the quality of being three-dimensional
243. Which of the following is NOT a multime-
dia production team members? D. the quality of a horizontal display reso-
lution
A. Audio specialists
B. Multimedia programmers 249. is a dynamic element.
C. Animators A. Text
D. Sales agents B. Video
253. Software that can run on any hardware 258. parameter that describes a condition that
platform (PC, Mac, SunSparc, etc.) or soft- shows the total number of lost packets ie
ware platform (Linux, MacOS, Unix, Win-
254. Which of the following is considered a 259. Which statement of WBS below is incor-
slide object? rect?
A. Placeholder A. WBS is useful for complex projects
B. Border B. WBS defines the work required to
achieve an objective
C. Paragraph
C. WBS provides timing of activities
D. Bullet
D. WBS is a tool for planning & schedul-
255. Which image file format is an uncom- ing a project
pressed raster file which may contain dif-
ferent depths of color depths per pixel, or 260. Brad is creating a flyer to promote Spe-
may be saved in grayscale? cial Olymipics. The flyer has a spiral path
A. PNG connecting the event name to the descrip-
tion. The spiral path is an example of a:
B. GIF
A. Smart Guides
C. JPEG
B. Stacking Order
D. BMP
C. Line
256. What is the name of the miniature slides
that appear along the left side in your pre- D. Shape
sentation software as you work on creat-
261. Which image file format should be used
ing your slideshow?
to save an image with a transparent back-
A. Thumbnails ground for use on a Web page?
B. Previews A. JPG
C. Snapshots B. BMP
D. Shortcuts C. TIFF
257. Janice created a collage of her friends for D. PNG
a school project. She used individual pic-
tures of each friend to create one picture. 262. Which file format would you use to cre-
Which editing feature did she use? ate a logo?
A. Cloning A. Bitmap
B. Scaling B. Raster
C. Layering C. Vector
D. Rotating D. PDF
263. Steve is creating a presentation that he 267. What controls the backgrounds, font
plans to use for in-person conferences, styles, font colors, and object styles for
Web conferences, and on his Web site. all slides within a presentation?
Why is a slide presentation a good choice A. A slide layout
for meeting his needs?
B. A master
A. The use of presentations as a way to
C. A style
communicate is declining, so he should
make multiple attempts to reach his audi- D. A theme
NARAYAN CHANGDER
ence. 268. Hypermedia is used to connect a multime-
B. Presentations can be viewed using a dia application to another
projection system, over the Internet, and A. text
as videos.
B. audio
C. He is using software that requires
C. graphic
the purchase of templates to create
professional-looking presentations. D. media
D. Presentations should be used more 269. Which of the following is a true state-
than once because they are often difficult ment about data compression?
to create. A. Data compression techniques can be
used to reduce the size of a file for stor-
264. What two fields are available in the IPv4 age or transmission
and IPv6 headers to mark packets for
QoS? (Choose two.) B. Data compression techniques can only
be used for certain types of data
A. The type of service
C. Data compression techniques cannot
B. Traffic Class be applied to files being transmitted over
C. Priority the internet.
D. none of above
D. VLan ID
270. Typeface is
265. Which image file format is the best for-
A. a family of graphic characters
mat to use for photographs on the Web?
(font) that usually includes many type
A. TIFF sizes and styles.
B. GIF B. Different fonts that does not have any
similarities
C. EPS
C. The letters that can be found on the
D. JPG keyboard face
266. By default, what chain is included in the D. none of above
proxy firewall filter feature
271. What is a Multimedia System?
A. input, output, forward A. Multimedia system is a field that sup-
B. scrnat, dstnat port the integrated processing of several
media types with at least one time depen-
C. prerouting, postrouting
dent or continuous media (e.g. video, au-
D. drop, reject dio).
B. Multimedia system is a system or ap- 275. Which option is used to specify how the
plication that support the integrated pro- canvas is modified?
cessing of several media types with con- A. Crop
272. Which of the following characteristics in- 277. Which of the following controls how each
dicates the amount of detail in a raster slide replaces the previous one?
graphic, or PPI? A. Transitions
A. Quality B. Collaborations
B. Size C. Animations
D. Movements
C. Resolution
278. You have been asked to design a logo for
D. Format
community organization. What kind of im-
273. The Toy Plane Company wants an ani- age would you create?
mated logo that will fly across the com- A. Raster
pany’s website home page. Which format B. Vector
will allow the image to be animated?
C. Transparent
A. Sail.ai D. Opaque
B. Sail.gif
279. This makes you think you really are
C. Sail.jpg flying to the moon.
D. Sail.pdf A. virtual
B. application
274. Amy is creating the artwork for the cover
of the yearbook. She wants to ensure that C. simulation
all of the graphics print in full so they must D. integrated
be on the:
280. Why would a high resolution picture you
A. Smart Guides took and then emailed to yourself not look
B. Artboard as crisp and have colors that were not ex-
actly the same?
C. Clipboard
A. the picture saved in the email con-
D. Path tained fewer pizels than the original
B. the picture saved in the email con- 285. Negative impact of using ICT & Multime-
tained more pixels than the original dia in Manufacturing
C. The picture saved in the email was en- A. reduce the product development cost
crypted
B. reducing the job opportunity for citizen
D. none of above
C. shorten a product’s time to market
281. Paula is taking pictures of her vacation to D. stay ahead of the competition
post on the family website. She wants her
NARAYAN CHANGDER
family to be able to access the files from 286. Digital audio quality can be increased by
various devices and browsers. Which fac- increasing the following:
tor is she considering? A. Bits per sample
A. Color Depth B. Sampling rate
B. Compression
C. Compression ratio
C. Portability
D. Number of channels
D. Transparency
287. Video compression is performed to re-
282. DMAIC in Six Sigma stands for duce the size of stored video and data rate.
A. Define-measure-analyze-improve- Which of the following statement is cor-
control rect?
B. Define-measure-analyze-improve- A. Video stream can be compressed be-
create cause it contains temporal redundancy
C. Design-measure-analyze-improve- that can use intra-frame compression.
control B. Video stream can be compressed be-
D. Define-manufacture-analyze-improve- cause it contains spatial redundancy that
control can use inter-frame compression.
C. MPEG-1 produces compressed data
283. What is the impact of using multimedia in rate of 1.5 Mbps.
our life?
D. Compressed data rate of MPEG-2 for-
A. develop higher-order thinking skills
mat is 2-4 Mbps.
B. motivate to do things in own way
288. file format for graphic
C. It represents stores and transmits all
information digitally A. .exe
D. negatively influence their behavioral B. png
290. Which term is used to describe bitmap im- 294. A collection of pages containing text and
ages? images typically presented on screen.
291. this is element of multimedia except 295. To receive signal, a translator is needed
to decode signal and encode it again at a
A. text
A. High Quality
B. audio
B. Lower Quality
C. graphic
C. Same Quality
D. movie
D. Bad Qualit
292. Define video
296. What is the default queuing method used
A. A source of presenting highly effective on the LAN interfaces of Cisco devices?
information
A. FIFO
B. A product of an The illusion of motion
created by the consecutive display of im- B. WFQ
ages of static elements C. CBWFQ
C. product of an illusion of movement D. LLQ
made up from series of still images when
it shown rapidly 297. Mike is creating a flow chart to show the
steps to change a tire. The flow chart
D. A product of recording moving images
will be viewed in various sizes. Why
using a camera or video machine
should the flow chart be created as a vec-
293. Maria is creating a presentation to high- tor graphic?
light her company’s latest product. It’s a A. Can support high color depths
very long presentation, and she wants to
B. Resolution Dependent
be sure it’s as perfect as she can make it.
What step does she need to take before C. Retain original quality when scaled
submitting it to her boss? D. Large File Sizes
A. Add music or videos so it doesn’t get
boring. 298. Mary is creating a basic line art graphic.
She does not want to save the graphic as
B. Use the spell-check and automatic cor- a GIF or TIFF file. Whatfile format would
rections tools to check for spelling, gram- be the best alternative?
mar, and punctuation.
A. PSD
C. Make the font different for every slide,
to add interest. B. PDF
C. JPEG
D. Change the formatting using a slide
master. D. PNG
NARAYAN CHANGDER
C. Data will be loss to certain extend
300. Term hypertext invented by
D. Compression rate is higher compared
A. Mark Antony
to lossless
B. Ted Nelson
306. A bride wants the photographer to make
C. Mathew Causy
some of her wedding photos black and
D. none of above white. Which image editing technique
should the photographer use?
301. Which of the following options can be
used to format text on a slide? A. Adjustment Layer
A. Fill Color B. Cropping
B. Align C. Aspect Ratio
302. Access to information in the multimedia A. Losing most of the information in the
content is flexible in a interactivity. compression process
D. Online marketing is a set of powerful email > Check Cache on Disk > Click Ap-
tools and methodologies used for promot- ply > OK
ing products through the Internet C. IP > Proxy > On the Extra Tab: Fill
320. What shape are all file formats? Cache Administrator with Admin email >
Check Cache on Disk > Click Apply > OK
A. oval
D. IP > Proxy > On the Action Tab: Fill
B. rectangular Cache Administrator with Admin email >
C. circles Check Cache on Disk > Click Apply > OK
NARAYAN CHANGDER
D. none of above 325. Which statement is true about using
graphics in presentations?
321. Which image format is commonly used for
digital photos, and Web and print publish- A. Graphics are pretty but cannot commu-
ing? nicate messages.
A. DRW B. Graphics can be used only if they are
your own original creations.
B. Vector
C. Graphics should not be used to attract
C. SVG attention.
D. Raster D. Graphics can be used to evoke emo-
tions.
322. Jack would like to apply a stained glass
effect to his photograph. Which image 326. When testing your product, you should:
editing technique should he use?
A. Concentrate on software configuration
A. Adjustment Layer
B. Focus on making the product work per-
B. Cropping fectly on one system
C. Filters C. Spend time configuring and testing
D. Transparency various platforms
D. Examine the bytes of data in the sector
323. The multimedia element that explains
idea through a picture is called 327. What is the leading source of photo and
A. text graphics around the globe?
B. graphic A. Stock Photo Library
C. animation B. World Wide Web
D. video C. Online Video Clips
D. Scanned Images
324. What is the sequence of steps for config-
uring a proxy server on a proxy? 328. What is the advantage of a vector im-
A. IP > Web Proxy > On the General Tab: age?
Fill Cache Administrator with Admin email A. Images can be scaled up or down with
> Check Cache on Disk > Click Apply > no loss of quality
OK B. Individual pixels can be changed,
B. IP > Web Proxy > On the Advanced which makes very detailed editing pos-
Tab: Fill Cache Administrator with Admin sible
C. They have a large file size B. Choose music that fits the atmosphere
D. none of above you wish to create.
338. The multimedia which is delivered 343. Which of the following is a vector graph-
through Web pages is called multi- ics format?
media.
A. SVG
A. TV-based
B. JPG
B. CD-based
C. Tape-based C. PPI
D. Web-based D. DPI
NARAYAN CHANGDER
339. What are ways that you can share your 344. Multimedia enhances the information for
Presentation so others can view it?
A. better communication and understand-
A. On a shared network drive only
ing
B. Published to the Internet only
B. poor communication and understand-
C. Published to the Internet or Cloud, pro-
ing
jector, or emailed to someone
D. Emailed to someone or on a projector C. misunderstanding
347. Phil is opening a new gym and wants an A. The network device sends the received
expert to design his logo. Which file for- traffic immediately.
mat would the developer use to save the
356. Which image file format creates a large 361. State two (2) examples of nonlinear in-
raster file best used for print but not rec- teractivity product
ommended for use on the Web? A. Movie and Website
A. PNG B. Movie and clip video
B. GIF C. Website and courseware
C. JPG D. Website and Clip video
D. TIFF
NARAYAN CHANGDER
362. Which image format is best used for pho-
357. A photographer would like to apply a tographs and offers a small file size?
brick wall texture to the background of A. PNG
a photo. What image editing technique
B. GIF
should be used?
C. BMP
A. Fill
D. JPEG
B. Clone Stamp
C. Adjustment Layer 363. Which option is used to maintain width
and height rations when resizing an im-
D. Blend Mode age?
358. Sarah is a designer of wedding invita- A. Constrain Proportions
tions. She emails prototypes of her work B. Anchor
to potential clients. What file format
should she choose to ensure the fonts and C. Free Transform
graphics are embedded in her files? D. Opacity
A. JPEG 364. which of the following is a file format for
B. GIF a multimedia element of video?
C. TIFF A. wav
D. PDF B. wmv
C. wma
359. Mary is using vector graphics to illustrate
weather patterns. To give the graphics a D. bmp
customized outline she needs to adjust the: 365. An athletic company needs to save their
A. Stroke logo in a format that supports 16 million
B. Fill colors and transparency for their website.
Which file is the best option to use?
C. Swatches
A. ball.jpg
D. Gradients
B. ball.gif
360. What do you learn from this topic? C. ball.ai
A. increase positive emotion D. ball.png
B. improved problem solving
366. People who create multimedia projects
C. word exploration also known as
D. access to give information A. Multimedia Developer
376. Brian hired a developer to create, save D. generally consists of estimating time
and archive an original artwork for his and cost for activities
new lawn service. Which file format
would the developer use to save the art- 380. Bob is drawnig a diagram to lay out his
work? vegatable garden. He uses paths to show
where the rows will be planted. At the
A. GIF
start and end of each path there is a/an:
B. JPEG
A. Anchor Point
NARAYAN CHANGDER
C. AI
B. Line Segment
D. PNG
C. Path
377. Before you begin developing any multi-
D. Smart Guide
media project, you should not:
A. Developa system for communication 381. How does multimedia affects your life as
between you, the client, and the team. a student?
B. Organize a method for tracking the re- A. learning process
ceipt ofthe material.
B. Create new friendship
C. Establish a management structure
C. better knowledge
withmilestones.
D. Accept unlimited feedback and modifi- D. provide opportunities
cations.
382. The best point to do focus group testing
378. Sharing an image online generally re- is with the
quires which of the following? A. concept
A. Low resolution B. prototype
B. High resolution C. beta
C. Blurring
D. gold master
D. Kaleidoscope
383. The cause of poor QoS is
379. Project monitoring
A. Rate
A. consists of the processes used to com-
plete the work defined in the project plan B. Packet loss
to accomplish the project’s requirements C. Jitter
B. consists of those processes per- D. Latency
formed to observe project execution so
that potential problems can be identified E. Noise
in a timely manner and corrective action
can be taken 384. Who conceptualized the 80:20 principle?
A. Cloning A. CBWFQ
B. Cropping B. LLQ
C. Layering C. FIFO
D. Rotating D. according to
387. a sequencer for displaying, animating, 390. Which of the following can be applied
and playing Cast members, and it is made to text and objects so that they can be
up of frames that contain Cast members, revealed on the slide when you click the
tempo, a palette, timing, and sound infor- mouse button?
mation A. Movements
A. Cast B. Collaborations
B. Score C. Transitions
C. Stage D. Animations
8.2 COMPRESSION
1. Which is bigger? D. none of above
A. MB (Megabyte) 3. How many bytes are in a gigabyte?
B. TB (Terabyte) A. 1, 000
C. GB (Gigabyte) B. 1, 000, 000
D. KB (Kilobyte) C. 1, 000, 000, 000
2. These files are still usable even when data D. 1, 000, 000, 000, 000
has been removed during compression.
4. What would be the best file formats to
A. Lossy compression choose for a photograph?
B. Lossless compression A. PNG
C. Both lossy and lossless compression B. JPEG
NARAYAN CHANGDER
B. Lossless B. Heuristic
C. Both C. Algorithm
D. none of above D. none of above
6. Which of the following is not an image 11. What is a reason why you need a codec?
file?
A. To play movies
A. PNG
B. To create JPG images
B. JPEG
C. To get onto the internet
C. Bitmap
D. To search for files
D. MPEG
12. The redundancy is zero when
7. What is lossless compression?
A. The probabilities are positive powers
A. No information is lost but file size is in-
of two
creased
B. The probabilities are negative powers
B. There is no loss of information at all
of two
after compression
C. Both
C. Files which have the exact same data
after compression D. None of the above
D. Compression involves an algorithm 13. Lossy compression
8. Where does the user work with files and A. Permanently removes data from a file
programs on a computer? B. Always leads to a noticeable loss of
A. ROM quality
B. BIOS C. Aims to remove redundant data
C. RAM D. Can return the original file to its origi-
D. Hard Disk nal quality
E. Would be a sensible choice for a music
9. What does Lossy Compression do to download site.‘
files?
A. Increases the file size and keeps the 14. Lossy compression Choose 3
same quality A. Permanently removes data from a file
B. Eliminates no information at all B. Always leads to a noticeable loss of
C. Decreases the file size and keeps the quality
same quality C. Aims to remove redundant data
D. Can return the original file to its origi- 20. Which of these are Lossy file type.
nal quality A. MP3
NARAYAN CHANGDER
C. lines
A. GIF
D. square functions
B. Zip
C. PNG 32. Colour depth defines
36. A programmer is writing a system that is 41. compression is another technique that
intended to be able to store large amounts changes the original file a little bit.
of personal data. As the programmer de- A. Lossy
NARAYAN CHANGDER
C. MP3
A. The picture saved in the email con- D. MP4
tained fewer pixels than the original im- E. GIF
age.
B. The picture saved in the email con- 52. Asymmetrical encryption techniques
tained more pixels than the original im- choose 2 possible answers
age. A. Are the most secure types of encryp-
C. The picture saved in the email was en- tion
crypted. Data encryption causes informa- B. Use a single key to encode/decode
tion loss. C. Use multiple keys to encode/decode
D. The picture saved in the email was en- D. uses different WiFi channels for each
crypted. Milan needs to decrypt the pic- secure message
ture to restore the original image quality.
53. What is the term used to define what must
48. FLAC and WAV are both examples of be known about a bitmap, for it to be rep-
A. Audio files using lossy compression. resented accurately?
B. Audio files using lossless compres- A. Microdata
sion. B. Metadata
C. Video files using lossy compression. C. Megadata
D. Video files using lossless compres- D. none of above
sion.
54. Vector images are used mostly for:
E. Image files using lossy compression
A. photography
49. Bitmap (.bmp) files use which of the fol-
B. digital logos or illustrations
lowing types of compression?
C. newspaper layouts
A. WinZip
D. typesetting
B. Lossy
C. Lzip 55. What is the bit rate?
D. Lossless A. the number of bits used per second of
audio
50. Which of the following is NOT a video B. the number of bits available for each
file? clip
A. MP4 C. uses between 8 and 32 bits per char-
B. MOV acter
E. Both (A) and (C) 64. Binary notation uses only 0-1. The deci-
mal system uses
60. What is the most important quality of loss-
A. 1-10
less compression?
B. 0-9
A. The data is transformed to usually
make it smaller. It can always be recon- C. 1-100
structed back to the original. D. 0 to infinity
65. I compress a 20MB file to 15MB. What is C. Download MKV player software
my % compression?
D. Use an Android phone
A. 15%
B. 5% 71. Which of the following are sound file
types?
C. 25%
A. MP3
D. 75%
B. FLAC
66. Once the file has been compressed, it can-
NARAYAN CHANGDER
not be decompressed back to the original C. AAC
file. D. JPEG
A. Lossy compression
B. Lossless compression 72. Which of these are lossless file type.
70. What must you do to play MKV files? B. Dots per inch(DOP)
A. Connect to the Internet C. Pixels per metre(PPM)
B. Use Windows Media Player D. none of above
86. How do you calculate the number of bits 91. Which of the following is not true if you
of a body of text in ASCII? increase the sample rate?
A. Number of characters * 7 A. Better quality of recording
B. Number of characters (including B. Needs greater storage space
spaces) *7 C. Larger file size
C. bits in Huffman * 7 D. Decrease in quality
D. bits in Huffman / 7
NARAYAN CHANGDER
92. Which of these image types lets you have
transparency?
87. Why is compression important?
A. PNG
A. Helps computer process bytes faster
B. JPG
B. Slows down computer
C. BMP
C. Gives your ISP more power
D. TIFF
D. Deletes your images so you have more
space 93. JPEG Stands for?
A. Joint Photo Exempted Grade
88. The character set for representing binary
as letters, numbers and symbols is called B. Joint Photographic Experts Group
C. Junior Photographic Export Group
A. SQL D. none of above
B. ASCII 94. What is Lossless Compression?
C. DECIMAL A. No information is lost but file size is in-
D. ALPHABET creased
B. There is no loss of information at all
89. The acronym CODEC stands for after compression
A. Code Creator C. Files which have the exact same data
B. Coder Declaration after compression
C. Coder Decoder D. Compression involves an algorithm
D. Common Decoder 95. The basic idea behind Huffman coding is to
90. Reducing file size has the advantages of A. compress data by using fewer bits to
encode fewer frequently occuring charac-
ters
A. Streaming over the internet is faster
B. compress data by using fewer bits to
for a given bandwidth
encode more frequently occuring charac-
B. Web pages using smaller image files ters
will load quicker
C. compress data by using more bits to
C. Less storage space is taken up on de- encode more frequently occuring charac-
vices using those files ters
D. Decompressing a file increases load D. expand data by using fewer bits to en-
on the CPU. code more frequently occuring characters
96. What would be the best file formats to B. Reduce storage requirements
choose for a music file? C. Improve quality of file
C. Can fully regenerate the original file 105. Based upon your experience with text
D. Includes files such as .ZIP compression, which of the following sen-
tences would compress best?
E. Would be a sensible choice for a music
download site A. The quick brown fox jumped over the
lazy dog.
100. What is file compression used for? B. How much wood would a woodchuck
A. Increase streaming speed chuck if a woodchuck could chuck wood?
C. Buffalo buffalo Buffalo buffalo buffalo 111. Select the advantages for lossless com-
buffalo Buffalo buffalo pression
D. JavaScript scripts are actually differ- A. Makes the file much smaller
ent scripts than Java scripts. B. Will send quicker
106. What does lossy compression do to C. A very simple algorithm
files? D. The quality will not be affected much
A. It increases the file size and keeps the
NARAYAN CHANGDER
same quality. 112. A song is digitally recorded by an artist
and saved to a file. Then, the artist runs a
B. It permanently eliminates all informa- program that takes the file as input and
tion on a file. produces a new file. The new file does
C. It decreases the file size and keeps the not include any sound data recorded that
same quality. cannot be heard by the human ear. The
artist then saves the new file over the
D. It eliminates unnecessary information
original file. Which of the following is true
and reduces the file size.
about the transformation of the digitally
107. Huffman trees use the of each char- recorded song data?
acter to work out their encoding. A. This is a lossy transformation of data
A. Frequency that results in a smaller file size.
B. Order in ASCII B. This is a lossy transformation of data
that results in a larger file size.
C. Number value
C. This is a lossless transformation of
D. none of above data that results in a smaller file size.
108. How many kilobytes are in a megabyte? D. This is a lossless transformation of
A. 10 data that results in a larger file size.
NARAYAN CHANGDER
C. 72 PPI
B. Lossless
D. Lossless
C. Both
126. What is a clock cycle?
D. none of above
A. A computer clock compared to an ex-
ternal clock 132. This type of compression reduces the en-
B. Amount of time to back up memory tire file without removing any data.
136. Which kind of file would be hurt most by 142. Dictionary based compression choose
a lossy compression algorithm? 3 answers
B. 8, 000 B. 16
C. 16, 000 C. 1
D. 32, 000 D. 2
147. Select the advantages for lossy compres- 152. Which is not an example of a text file
sion unit?
A. Makes the file much smaller A. Kilobyte
B. Will send much quicker B. Megabyte
C. A very simple algorithm C. Millionbyte
NARAYAN CHANGDER
153. What type of compression has been used
148. What does Lossy Compression do to
on the following data? 4C2L4C1M
files? (4-6)
A. Run-Length Encoding
A. Increases the file size and keeps the
same quality B. Dictionary Compression
B. Eliminates no information at all C. Variable-Length Encoding
A. .DOC C. 8
B. .JPG D. 16
C. Multiband transformation 162. How many colours can a JPG file dis-
play?
D. Chrome sampling transformation
A. 256
168. While using image compression algo- 172. A JPG image file lets you have
rithms we know that jpeg is a lossy file A. Super-high quality image with large
format for image compression and png file size
files use a lossless compression format.A
software development company is build- B. Low quality image with large file size
ing a custom application for the govern- C. High quality image with small file size
ment. The software will scan images of
D. Poor quality image with low file size
citizens of the country and store it in a
database. The images can then be pulled
NARAYAN CHANGDER
173. Which of the following cannot use lossy
up with other necessary information as compression?
needed. What would be the image for-
A. Word document
mat that can be best suitablefor this soft-
ware? B. Audio file
A. PNG C. Video file
B. JPEG D. Image file
C. Neither PNG or JPEG E. All of them
D. Both PNG and JPEG 174. What is compression? (1-4)
169. Lossy or lossless? Some quality is lost A. To convert one file to another
B. To reduce the size of data to save
A. Lossy
space
B. Lossless
C. To minimize the time taken for a file to
C. Both be downloaded
D. none of above D. To compress something by pressing it
very hard
170. How many megabytes are in a ter-
abyte? 175. A character set is
A. 1, 000 A. What language can be used in a com-
puter system
B. 1, 000, 000
B. The fonts that a computer has in-
C. 1, 000, 000, 000
stalled.
D. 1, 000, 000, 000, 000 C. The possible characters that can be
represented by a computer system.
171. MP3 and WMA files are both examples
of D. none of above
A. Audio files using lossy compression. 176. Which of these file types is best for
B. Audio files using lossless compres- printing or scanning large photographic im-
sion. ages?
C. Video files using lossy compression. A. TIFF
177. Why is it necessary to compress files? 182. Select the types of compression there are
A. File compression enables data to be A. Loss
D. Both (A) and (B) 192. What unit is sample rate measured in?
E. Both (A) and (C) A. Bits per second (bps)
187. How many bytes are in a kilobyte? B. Hertz (Hz)
A. 100 C. Megabits per second (Mbps)
B. 1000 D. none of above
C. 1, 000, 000
193. Which of these is NOT a way to view the
NARAYAN CHANGDER
D. 1, 000, 000, 000 codecs installed on your computer?
188. Which of the following is the first phase A. The MSINFO32 application on Win-
of JPEG? dows
A. DCT Transformation B. Windows Media Player
B. Quantization C. Third party Applications
C. Data Compression D. Microsoft Word setings
D. None of the above
194. A bitmap image of 20 by 20 pixels using
189. Which order is correct? a colour dept of 8 bits would have a file
A. Bit, Nybble, Byte, Kilobyte, Megabyte, size of around:
Gigabyte, Terabyte A. 400 bytes
B. Bit, Byte, Nybble, Megabyte, Kilobyte.
B. 3200 bytes
Gigabyte, Terabyte
C. 40 bytes
C. Bit, Nybble, Byte, Megabyte, Kilobyte,
Gigabyte, Terabyte D. 320 bytes
D. none of above
195. AVI files are examples of
190. Which 3 statements best describe Loss- A. Audio files using lossy compression.
less compression
B. Audio files using lossless compres-
A. Is used when not all the information is sion.
needed
C. Video files using lossy compression.
B. Is not as effective as lossy compres-
sion D. Video files using lossless compres-
C. Can fully regenerate the original file sion.
208. Match the keyword to its meaning:Lossy 212. How many colours can a bitmap using 2-
compression bit colour depth contain?
A. No information is lost when com- A. 2
pressed B. 4
B. A file that takes up less space than the C. 8
original file
D. 16
C. Information is lost when compressed
NARAYAN CHANGDER
D. none of above 213. JPEG (JPG) files are an example of
A. Audio files using lossy compression.
209. An author is preparing to send their book
to a publisher as an email attachment. B. Audio files using lossless compres-
The file on their computer is 1000 bytes. sion.
When they attach the file to their email, it C. Video files using lossy compression.
shows as 750 bytes. The author gets very
D. Image files using lossless compres-
upset because they are concerned that part
sion.
of their book has been deleted by the email
address.If you could talk to this author, E. Image files using lossy compression
how would you explain what is happening
to their book? 214. What vector file is used with HTML and
web page design?
A. The file is smaller. However, the infor-
mation may not be lost. A. PDF
228. When you carve a graphics file, recover- 233. Which best describes Lossless Compres-
ing the image depends on which of the fol- sion?
lowing skills? A. No information is lost but file size is in-
A. Recovering the image from a tape creased
backup B. There is no loss in information at all af-
B. Recognizing the pattern of the data ter compression
content C. Files which have the exact same data
NARAYAN CHANGDER
C. Recognizing the pattern of the file after compression
header content D. Compression that involves an algo-
D. Recognizing the pattern of a corrupt rithm
file
234. Huffman coding is an encoding algorithm
229. What is the maximum number of values used for
that can be represented in 8 bits? A. lossless data compression
A. 16 B. broadband systems
B. 256 C. files greater than 1 Mbit
C. 65, 536 D. lossy data compression
D. 128 235. B is how many kB?
230. The following is true about metadata: A. 350
A. It is data about data. B. 3500
D. none of above 236. GIF and BMP files are both examples of
A. Audio files using lossy compression.
231. What type of data do MIDI files record?
Select all that apply. B. Audio files using lossless compres-
sion.
A. Speech
C. Video files using lossy compression.
B. Note
D. Image files using lossless compres-
C. Velocity sion.
D. Instrument E. Image files using lossy compression
232. How many colours can be represented 237. Which of the following are not in a com-
with a 4 bit colour depth? pressed format? (7-9)
A. 2 A. JPEG
B. 4 B. MPEG
C. 16 C. Bitmap
D. 256 D. MP3
249. The codec created by Apple is 253. Which compression allows the image to
be reversed back?
A. VP9
A. Lossless
B. AVI
B. Lossy
C. Quicktime
C. Glossy
D. MP3
D. none of above
250. MP4, MPEG and MOV files are all exam-
NARAYAN CHANGDER
254. What sample rate is used for CD quality
ples of
sound?
A. Audio files using lossy compression.
A. 44, 100 Hz
B. Audio files using lossless compres- B. 88, 200 Hz
sion.
C. 22, 100 Hz
C. Video files using lossy compression.
D. none of above
D. Video files using lossless compres-
sion. 255. How would you encode 8xxxxxY;;;;;;;;;>
using RLE.
E. Image files using lossy compression
A. 81x5Y1;9>1
251. stores a graphic file; 8 bit colour depth B. 185x1Y9;1>
so 256 colours available; suitable for lo-
gos; transparency possible; lossless com- C. 8xY;>
pression D. 186x1Y6;1>
A. .gif 256. What type of compression would a
B. .png Python coding file need to use?
C. .bmp A. Lossy compression
D. .jpg B. Lossless compression
C. Doesn’t matter. It can use either lossy
252. Which type of compression is best suited or lossless compression.
to compressing the data:How much wood
would a woodchuck chuck if a woodchuck D. none of above
could chuck wood? 257. Which of these file formats is lossy?
A. Run-length encoding A. AI
B. Dictionary encoding B. TIFF
C. Variable-length encoding C. JPG
D. none of above D. PNG
12. Select the TRUE statement about Optical 16. This means a medium of communication.
Character Recognition (OCR) software A. Media
A. OCR Software can trigger common B. Multi-
menu events such as Save, Open, Quit,
and Print C. Audio
B. OCR Software can teach the system to D. Video
recognize other commands that are more
specific to your application 17. Which of the following is a format that
NARAYAN CHANGDER
can be exported from Adobe Audition soft-
C. OCR Software can convert paper docu- ware?
ments into a word processing document
on your computer without retyping or A. sold
rekeying. B. JPEG
D. OCR Software use special color- C. XXWT
correction hardware to ensure that what
D. Reader
they see on screen matches precisely
what will be printed 18. MPEG stands for:
13. Which of the following produces graph- A. Moving Picture Experts Group
ics image files that are small, download B. Maintain Picture Experts Group
quickly, & are easily resized without af-
fecting image quality? C. Movie Picture Experts Group
22. Which of the options shows (an) exam- 27. You have been assigned to develop a mul-
ple(s) of multimedia? timedia kiosk for a shopping complex that
will allow users to locate specific shops.
32. Each webpage has its own unique C. 3-D Modeling and Animation Tools
A. database connection D. Image-Editing Tools
B. personal search engine 38. What is MOOC in Media Information Tech-
C. animation scheme nology?
D. universal resource locator (URL) A. Media Open Online Course
B. Massive Open Online Course
33. Which of the following is NOT an advan-
tage of Multimedia C. Multimedia Open Online Course
NARAYAN CHANGDER
A. Easy to use D. Macro Open Online Course
B. Expensive 39. “Where is information stored”
C. Gains and Holds attention A. Storage media
D. Trendy B. Transmission media
34. What is the attributes of a ‘Embedded C. Representation media
Database’? D. Presentation media
A. Uses graph structures 40. Listed below are refer to kerning, EXCEPT
B. Built in an application A. Condensed
C. Links objects together B. Expanded
D. Used for business C. Regular
35. Which of the following is the correct com- D. Larger
bination of multimedia elements and stan-
41. If you are designing an e-storytelling book,
dard file formats?
you need to convert the paper document
A. Audio (date) into word processing document on your
B. Audio (wav) computer without retyping or rekeying by
using
C. Video (.doc)
A. Barcoding
D. Graphic (http)
B. Optical Character Recognition Soft-
36. Barbara wants to make herself look taller ware
in a photo. What should she chnage about
C. Voice Recognition System
her photo?
D. Quick Response Codes
A. Rotation
B. Aspect Ratio 42. Card-and page-based systems typically
provide two separate layers on each
C. Fill
card:a that can be shared among many
D. Transformation cards, and a foreground layer that is spe-
cific to a single card.
37. are specialized and powerful tools for
creating, enhancing, and retouching exist- A. background layer
ing bitmapped images. B. Icon-or object-based
A. Sound-Editing Tools C. Time-based tools
B. Painting and Drawing Tools D. Adobe’s Director
43. a software package designed to create 48. It is a visual storytelling tool that creates
electronic presentations consisting of a se- highly engaging presentations.
ries of separate pages or slides.
D. Graphic Artist A. C#
B. QuickTime
46. What multimedia is best to use if you were
C. Adobe Flash Player
tasked to explain the similarities between
linear and non-linear text? D. Microsoft Silverlight
A. text and graphics 52. is using more than 1 medium (way or
B. audio means) of expression or communication.
A. Medium
C. video
B. Multimedia
D. animation
C. Format
47. Advertisements are trying to get you to D. Basics
A. do something
53. Which of these is not a category a of mul-
B. believe something timedia?
C. buy something A. Software products
D. all of the above B. Entertainment products
NARAYAN CHANGDER
C. music
E. Firefox
D. video
60. Which of the following media is part of
55. Which activity is most likely protected by
multimedia content. Click what is appro-
fair use?
priate
A. A. Emailing copyrighted songs to your
A. Visual media
friends
B. text media
B. B. Adding a website’s photograph to
your blog without the author’s permission C. audio media
C. C. Using a clip from a movie for a D. motion media
school project
61. How many types of data model are there
D. Both a and c in database system?
56. It is electronic media possessing both a A. 3
sound and a visual component? B. 4
A. VISUAL C. 5
B. SOUNDS D. 6
C. AUDIOVISUAL
62. The illusion of motion created by the con-
D. MUSICS
secutive display of images of static ele-
57. are often the first working drafts of ments
your project, typically for internal circula- A. animation
tion only, and can have problems or be in-
B. video
complete.
C. video streaming
A. ASCII text files
D. storyboard
B. Alpha releases
C. Stampers 63. Multimedia is a communication process,
D. Beta releases based on computer technology that com-
bines the use of digital elements. State
58. What do the letters URL stand for? the elements.
A. Universal Resource Locator A. Text
B. Unbelievable Resource Locator B. Radio
C. Uniform Resource Locator C. Paper
D. Undergound Railway Line D. Graphic
64. , such as CorelDraw, FreeHand, Illus- 69. One of the major goals of HTML5 is to:
trator, Designer, and Canvas, is dedicated A. eliminate the need to comply with W3C
to producing vector-based line art easily
65. Which of the following file extensions re- 70. Non linear editing can cause where edit
fer to Audio files. and re-edit and re-edit again can cause
video to be less true than the original ma-
A. MP3
terial
B. AVI
A. video loss
C. MP4
B. generation loss
D. WAV
C. quality loss
E. FLAC
D. editing loss
66. A class in which a tutor gives intensive in- 71. Apart from Adobe Audition software,
struction in some subject to an individual what software can adjust the sound of mu-
student or a small group of students. sic and voice recordings?
A. Print media A. Adobe Audition
B. Presentation B. Adobe Flash Player
C. Game C. Adobe Premiere Pro
D. Tutorials D. Adobe Photoshop CC
67. Which of the following is NOT a technol- 72. Multimedia developers will often attach
ogy likely to prevail as a delivery means more than one monitor to their computers
for interactive multimedia files? because
A. copper wire A. it enhances data transfer between
B. glass fiber computers
C. radio/cellular B. they can compare images on different
monitors
D. floppy disk
C. it enables cross-platform testing
E. CD-ROM
D. they can have more windows visible at
68. A form of multimedia that includes sound. one time
A. Media
73. Multimedia is widely used to add special
B. Multimedia to movies.
C. Audio A. arrangement
D. Video B. attachments
NARAYAN CHANGDER
B. Five to ten percent
C. Ten to fifteen percent 79. Multimedia means the use of more than
one in communication or presentation.
D. Twenty to twenty-fivepercent
A. number
75. Online marketing, Internet banking and
B. media
Web-based learning is an example of mul-
timedia application. Briefly describe one C. file
advantage of all the application D. sound
A. An ease to use and reach application
to user 80. is the electronic or mechanical con-
version of images of typed, handwrit-
B. Promote the product online ten or printed text into machine-encoded
C. Transaction can be made anywhere text, whether from a scanned document,
anytime a photo of a document, a scene-photo or
from subtitle text superimposed on an im-
D. Increase the customer for each com-
age.
pany
A. DVD
76. Using a Web editor requires you to B. OCR Software
have HTML knowledge to get started
C. Flash Memory or Thumb Drives
A. Text based
D. CD-ROM
B. CD Based
C. WYSIWYG 81. People might use a word processing pro-
gram to:
D. none of above
A. Communicate with people
77. An agent for something. Used for dissem- B. Edit video
ination (distribute) and representation of
information. C. Sort and organize information to refer-
ence later
A. media
D. Create and edit text documents
B. multimedia
C. multimedia systems 82. Provide a structure of linked elements
91. Refer to various physical means for stor- 96. is data in the form of words or alpha-
ing computer data, such as magnetic tapes, betic characters.
magnetic disks, or digital optical disks (CD-
A. Audio
ROM, CD, DVD)
A. Storage media B. Video
B. Transmission Media C. Animation
C. Perception media D. Text
NARAYAN CHANGDER
D. Representation media
97. What is presentation software?
92. It is the oldest form of motion picture tech-
nology capable of capturing lifelike video- A. A. A program used to collect data
style images. B. B. A program used to display informa-
A. PRINT MEDIA tion usually in the form of a slideshow
B. TELEVISION C. C. A computer program that generates
C. MOVIES a worksheet
93. What kind of file formats are .au, .mp3, 98. Which of the following is the integration of
.aiff, & .wav? text, sound, graphics, animation and video
A. Video into a single unit?
B. Graphics A. website
C. Document B. webpage
D. Audio C. multimedia
94. A search that matches pages / documents D. presentation
to a work (product) input on a website is
known as a 99. Which of the following best define the
A. box word media?
B. square A. used for communication
C. search bar B. it is traditional media only
D. chocolate bar C. it is news online
95. are people who provide material such D. used for music
as video footage, audio tracks, competi-
tions and other materials. They’re experts 100. Which element is used in contents, menus,
in the subject matter of the application and navigational buttons?
ensure its technical accuracy.
A. Graphic
A. Content providers
B. Project managers B. Audio
101. Which of the following is true about 106. It is an episodic series of spoken word
client-side JavaScript? digital audio files that a user can download
to a personal device for easy listening.
B. pictures B. Network
C. newspaper C. Satellite
D. smart art on cycle D. none of above
NARAYAN CHANGDER
D. Advances in graphics, movies, and au- A. Vector graphics
dio B. Virtual actors
112. Multimedia play’s important role today. C. Bitmap graphics
Which of the following BEST describe mul- D. Bit depth
timedia?
117. Which of the following file extensions re-
A. moving images and text
fer to Image files.
B. images and audio
A. GIF
C. integration of still and moving images,
text, and sounds by means oftechnology B. MOV
NARAYAN CHANGDER
130. How many PPI are usually needed for B. Adding special effects
professional and commercial prints such as
advertising hordings for the quality to be C. Superimpose images or text
acceptable. D. Cut a part of the video for a specific
A. 150 use by using the ‘magic wind tools’.
B. 250
136. A presentation element that organizes
C. 300 the presentation into a series of illustra-
D. 500 tions displayed in sequence for the pur-
pose of pre-visualizing the final show
131. is a method for wiring up computers
between Windows and Macintosh. A. storyboard
149. are authoring systems, wherein el- 154. Educational website helps make the pro-
ements and eventsare organized along a cess of learning entertaining and attrac-
timeline, with resolutions as high as or tive to the audience, especially in today’s
higher than1/30 second generation. Which of the following BEST
describe computer-based training?
A. time-based
NARAYAN CHANGDER
A. a video game
B. icon-based
B. a method of training a computer to re-
C. page-based
ject viruses
D. date-based
C. a method of education that allows peo-
150. If the client changes his or her mind later ple to learn at their own pace, usinginter-
in the process, any revisions of the previ- active software.
ously approved materials would require a D. a method of training the computer to
, meaning that the client agrees to pay perform routine tasks
the additional costs for making edits.
155. What principle do you apply in evaluating
A. CMP multimedia that points to the followers of
B. RFP media content?
C. sign-off A. location
D. change order B. content
C. context
151. A search that matches pages / docu-
ments to a work (product) input on a web- D. network
site is known as a
156. are authoring systems, wherein-
A. box multimedia elements and interaction cues
B. square (events) are organized as objectsin a struc-
tural framework or process
C. search bar
A. card-based
D. chocolate bar
B. icon-based
152. Listed below are animation techniques C. object-based
EXCEPT
D. time-based
A. path-based animation
157. A or allows your project to play
B. cell-based animation
back withoutrequiring the full authoring
C. script based software and all its tools and editors.
D. spatial compression A. run-time version
153. These are resources and materials that B. standalone
offer a variety of flexible supports C. macintosh
A. Podcast D. segment
B. Social Media E. synchronization
158. Which of these is an example of MASS 163. Text that can provide links to related con-
media? tent in a multimedia application is called
159. Which of the following inspire the United 164. Multimedia is made up of words.
States to form a new way of communicat- A. 2
ing, now commonly known as the Inter-
net? B. 3
A. Gulf War C. 1
B. Vietnam War D. 4
C. World War II 165. State one IMAGE file format that is suit-
D. Cold War able for transferring file over Internet.
A. png
160. Which of the following is not an are of
application in multimedia system? B. jpeg
A. Education C. gif
NARAYAN CHANGDER
D. Website / presentation C. virtual reality
170. Transmit information via such media as D. virtual response
AR advertising, billboards, blimps, and fly-
ing billboards. 176. What is the wrong statement about cap-
tured and synthesized media
A. DIGITAL MEDIA
A. Captured media refers to information
B. INDOOR MEDIA types captured and digitized from the real
C. OUTDOOR MEDIA world analog signal.
D. PRINT MEDIA B. Synthesized media refers to informa-
tion types synthesized by the computers.
171. Multimedia of elements grabs the
viewer’s attention and retains it. C. Examples of captured media include
digital bitmap image captured from a digi-
A. mixture tal camera.
B. combination D. An example of captured media is a
C. control computer generated animation
D. contribution
177. Which of the following statements is NOT
172. Multimedia is so hot because of what true about FireWire?
two general factors (Two answers) A. It was introduced by Apple in the
A. Technology Push 1980s
B. Market Pull B. The transfer speed is 12Mbps
C. Needs of the people C. It can connect multiple computers and
peripheral devices (peer-to-peer)
D. Changing environment
D. It is the industry standard and pro-
173. The first slide of a presentation is called vides support for high-bandwidth serial
title slide. data transfer, particularly for digital video
A. True and mass storage
B. False 178. with icons or objects is perhaps the
C. May be simplestand easiest authoring process
D. Don’t Know A. Simple branching
174. A broad term for words used to express B. Object-based authoring programs
a concept C. Visual programming
A. text D. none of above
D. ANYCAST B. exit
C. emphasis
184. What is the primary goal of an exten-
sion? D. edit
188. allows direct communication and B. Original works of authorship only on-
sharing of peripheral resources such as file line, not in print
servers, printers, scanners and network C. Original works of authorship only in
routers. print, not online
A. MAN D. Original works of authorship online as
B. WAN well as in print
C. AMN 194. It refers to the conventional means of
NARAYAN CHANGDER
D. LAN mass communication practiced by various
communities and cultures.
189. CPU Operations
A. TRADITIONAL MEDIA
A. Fetch
B. MULTIMEDIA ARTIST
B. Encode
C. COMMUNICATION AND TECHNOLOGY
C. Decode
D. MODERN DEVELOPMENT
D. Execute
195. In1980’s, ISP is a company that pro-
190. What kind of file formats are .gif, .jpg, vides individuals and other companies ac-
.png, & .tif? cess to the internet and other related ser-
A. Audio vices such as Web site building and virtual
hosting. What does ISP stand for?
B. Document
A. International Service Protocol
C. Graphics
B. Internal Services Protection
D. Video
C. Internet Service Provider
191. Which of the following is not a digital me- D. Internet Search Program
dia
196. JM and Rence made a tiktok because it
A. Graphics
was their bonding.
B. Clicking a mouse
A. Text Material
C. Video
B. Photo & Still Images
D. Animation
C. Audio Files
192. is an application that allows you D. Video Presentation
to send and receive messages over cell
E. Infographic
phones.
A. Animated service 197. You want to give your Web site users the
ability to view high-quality video. Connec-
B. Message service
tion speed is not an issue. Which file for-
C. MMS mat could you use?
D. Multimedia A. AVI
206. Typically create vector graphics, which 211. Why are audio & video files compressed
use mathematical formulas to represent before they are transferred across the in-
image content instead of pixels ternet?
A. Painting Program A. To shorten the amount of time re-
quired to download them
B. Drawing Program
B. To remove any redundant information
C. Image Editing Program
C. To provide efficient integration of mul-
D. Audio Capture and Editing Program
NARAYAN CHANGDER
timedia formats with the browser & com-
puter
207. What assigns an intensity value to each
pixel, ranging from 0-255 for each of the D. To enable audio & video files to be
three color components in a picture? viewed and/or heard as part of a standard
HTML document
A. Color Mode
212. In a multimedia system, a and
B. RGB speaker are used for providing sound.
C. CMYK A. mouse
D. Color Depth B. pointer
C. microphone
208. What is considered as one of the most
popular multimedia applications because D. scanner
of its movies and video games?
213. Lindsey decided to make her profile pic-
A. Advertisement ture black and white. What image editing
B. Entertainment technique should she use?
A. Blend Modes
C. Education
B. Layering
D. Industrial
C. Layer Masks
209. What is used to improve the interactivity D. Adjustment Layer
of multimedia applications? It is embed-
ded within an HTML document. 214. Define which statement are TRUE refer
to san serif
A. CSS
A. Have a little decoration at the end of a
B. HTML5 letter stroke
C. JavaScript B. Without decoration at the end of a let-
D. Java ter stroke
C. Example:Times New Roman, Century
210. is the recording, reproducing, or and Bookman
broadcasting of moving visual images.
D. Common use for printed media
A. Game
215. What do you not need to making Multi-
B. Video media?
C. Audio A. Hardware
D. Graphics B. Software
216. A good way for communication and helps 221. Multimedia games are a
us to understand the messages that some- A. Software product
one’s trying to convey because of the com-
bination of text, graphics, audio, video, B. Educational product
and animation using computer. It is called C. Entertainment product
D. Information product
A. media
222. JPEG may be expanded as
B. newspaper
A. Joint photographic Exports Group
C. multimedia
B. Joint Physical Experts Group
D. hypermedia
C. Joint Physical Exports Group
217. How many formats of multimedia are
D. Joint Photographic Experts Group
there?
A. 4 223. Once the Storyboard is confirmed, the
multimedia developers will start the
B. 5
Phase
C. 6
A. Design
D. 7
B. Evaluation
218. Carla is an author on Wattpad and she C. Implementation
wants to publish her work.
D. Publishing
A. Text Material
224. represented in binary format
B. Photo & Still Images
A. Vector
C. Audio Files
B. Digital
D. Video Presentation
C. Analog
E. Infographic
D. Bitmap
219. The video signal is magnetically written
to tape by a 225. What is multimedia system
A. track A. Multimedia system is a field involving
computer-controlled integration of text,
B. helical head
graphics, still images, animations, audio
C. spinning recording head and/or video where every type of informa-
D. tape path tion can be represented, stored, transmit-
ted and processed digitally.
220. A program that has not yet been intro- B. Multimedia system is a system capa-
duced to the public but is being released to ble of processing multimedia data that in-
a select few to test is happened in clude continuous media such as video and
A. alpha testing audio.
C. Multimedia system is a system to cre- 231. These are graphic visual representations
ate multiple data of information, data, or knowledge in-
tended to present information quickly and
D. Multimedia system is a system to orga-
clearly
nize the data
A. Vlog
226. What is Haptics Technology? B. Infographics
A. It is technology. C. Blog
NARAYAN CHANGDER
B. It is one of the type of technology. D. PowerPoint presentation
C. Combining hard sensor information.
232. Individual dots which make up bitmap
D. Feedback technology that takes advan- graphics.
tage of the users sense of touch by apply-
A. Multimedia
ing force.
B. Morphing
227. Advertising, digital catalogues, simula- C. Megapixel
tions are examples of use of multimedia
in D. Pixel
248. What is defined as the behaviors shown 253. “Which medium is used to transmit data”
by the person or individual that uses the
A. Transmission media
application or product over the net?
B. Storage media
A. user participation
C. Perception media
B. user as a contributor
D. Representation media
C. user experience
D. user demand 254. Which of the following is a miniature
NARAYAN CHANGDER
Java program that is downloaded into a
249. is used for deleting or rearranging Web browser when a user requests a Web
scenes, adding voice-overs, and adding page?
other special effects
A. ActiveX control
A. Painting Program
B. Viewer
B. Drawing Program
C. Plug-in
C. Image Editing Program
D. Java applet
D. Video Editing Software
255. is a vital element of multimedia
250. refers to how easy it is to open, mod-
menus, navigation systems, and content.
ify, and view the files on computers us-
ing different operating systems, software, A. audio
and browsers. B. video
A. Compression C. text
B. Portability D. graphic
C. Transparency
256. Barcode readers are probably the most
D. Color Depth
famous optical character recognition de-
251. are authoring systems, wherein vice in use today which can
theelements are organized as pages of a A. read graphics into a computer
book or a stack of cards
B. recognize the numeric characters of
A. card-based the universal product code pattern
B. cover-based C. scan voice and display in the computer
C. page-based D. scan and save the text in the computer
D. paper-based
257. Select the multimedia element. A multi-
252. What is the moving images of artwork media application may require the use of
called? speech, music and sound effects.
A. video A. Audio
B. animation B. Video
C. virtual reality C. Animation
D. picture D. Graphic
258. The use of in multimedia material 263. In multimedia system sounds, is the
makes it easier to search and view related terminology used in analog form.
content.
B. audio, video and scan tracks 273. Buying and selling goods and services on
C. audio, video and image tracks the Internet is called ?
NARAYAN CHANGDER
B. False 274. Select CORRECT statements about digital
C. May be video.
D. Don’t Know A. Digital video device produces excellent
finished products at a double of the cost of
270. It is a recording of moving visual images analog.
made digitally.
B. Digital video eliminates the image-
A. Audio degrading analog-to-digital conversion.
B. Video C. Getting the rights for digital video is
C. Text easy.
D. Picture D. Producing digital video is fast and not
time consuming.
271. Maria is doing her homework while talk-
ing to her mom on a video call. 275. Identify another way of saying DPI (Dots
per inch).
A. Text Material
A. Screen resolution
B. Photo & Still Images
B. quality
C. Audio Files
C. resolution
D. Video Presentation
D. Printer resolution
E. Infographic
272. Choose the wrong statement about dis- 276. Multimedia tools include
crete and continuous media A. databases
A. Discrete media refers to media involv- B. spreadsheets
ing space dimension only (e.g. still im- C. leaflets
ages, text and graphics).
D. Videos, animations, sound, words, im-
B. Discrete media is also referred to as
ages
static mediaContinuous media refers to
time-based media (e.g. sound, moving im- 277. What type of text that used for body of
ages, and animation) where media con- text to guide the reader’s eyes along the
tent may change over time. line of text?
C. Discrete media is similar to captured A. Arial
media
B. Verdana
D. Continuous media is also referred to
as dynamic media or time-based media or- C. Palatino
temporal media. D. Genera
278. Graphics created entirely on a computer, C. Content on the Internet is typically per-
using 2D or 3D graphics software. manent
288. Several options like this are examples 293. Which statement about vector graphics is
of:-Text is encoded in ASCII-An audio data true?
stream in PCM (Pulse Coded Modulation)- A. Vector graphics have much larger file
Image in JPEG format-Video in MPEG for- sizes than raster graphics.
mat
B. Vector graphics are pixel-based.
A. Representaton media
C. GIFs and JPGs are vector graphics.
B. Presentation media
D. Vector graphics are saved as se-
NARAYAN CHANGDER
C. Transmission data quences of vector statements.
D. Perception media 294. Web pages that use ActiveX:
289. This is the process of presenting a topic A. may not render properly in Web
to an audience. browsers other than Internet Explorer or
Mozilla Firefox.
A. Print media
B. cannot run Java applets.
B. Website
C. can include animation, audio and
C. Simulation video.
D. Presentation D. may not render properly in Internet Ex-
plorer or Mozilla Firefox.
290. lTwo-dimensional still figure or illustra-
tions 295. Which one of the following IS NOT / ARE
NOT typically part of a multimedia specifi-
A. graphics cation?
B. animation A. text
C. video B. odors
D. storyboard C. sound
D. video
291. The “ROM” in “CD-ROM” stands for:
E. pictures
A. random-order
B. real-object memory 296. Processor market are
A. Intel
C. read-only memory
B. Microsoft
D. raster-output memory
C. AMD
E. red-orange memory
D. Lenovo
292. The role is to develop the graphic el-
297. It is profoundly frustrating to face mem-
ements of the program
ory shortages time after time when you
A. Project Manager are attempting to keep multiple applica-
tions and files open simultaneously. Iden-
B. Subject Matter Expert
tify the hardware that can be upgraded in
C. Instructional Designer order to allow a computer to run smoothly
D. Graphic Artist A. RAM
NARAYAN CHANGDER
B. Multimedia
313. Which of the following languages is an
C. Presentation media
object-oriented programming language de-
D. Perception media veloped by Sun Microsystems that is often
308. In Google, what is the system that orders used when data needs to be shared across
the results? a network?
A. Index A. JavaScript
B. Cookies B. Java
C. Spider program C. LiveScript
D. Page rank D. Python
309. What are some types of Authoring 314. The purpose of any is to test the ini-
Tools? tial implementation of your idea and im-
A. Icon-and Object-Based prove upon it based on test results.
B. Card-and Page-Based A. executive summary
C. Project-Based B. proposal
D. Time-Based C. prototype
310. A is represented by a dot or square D. creative strategy
on a computer monitor display screen.
A. Vector 315. Which of the following is not a key prop-
erty of multimedia
B. Bitmap
A. Independent media
C. Pixel
B. Dependent media
D. none of above
C. Integration
311. Why is multimedia used?
D. Computer-Controlled systems
A. It makes a product look more profes-
sional 316. What type of software/app do you need
B. It is more interesting and engaging on a computer to view web pages?
than just boring pain text A. Camera
C. It appeals to more people as some like
B. Web Browser
reading text, others prefer to listen and
some like watching content C. Web Server
D. All of these options D. Text Editor
317. Select CORRECT statements about analog D. Refers to the communication channels
video through which we disseminate news.
320. It is a media and content that uses a dif- 325. Non-physical creations such as stories,
ferent content form. music, works of art, and computer soft-
ware are called.
A. Media
A. Free downloads
B. Multimedia
B. Interesting property
C. Audio
C. Intellectual property
D. Video
D. Restricted permission work.
321. What is motion and information media?
326. It is the conversion of sound from analog
A. Form of media that has the appear- format to digital format.
ance of moving texts and graphics.
A. Sampling
B. Electronic media possessing both a
sound and visual component. B. Digitizing
C. We can see and understood by observ- C. Trimming
ing the visual aspect of any object. D. none of the above
327. The roles are to define the scope of 332. Light passes from an object through the
the project and discuss with the client. video camera lens and is converted into an
electrical signal by a
A. Project Manager
A. signal converter
B. Subject Matter Expert
B. camera focus device
C. Instructional Designer
C. light converter
D. Graphic Artist
D. charge coupled device
NARAYAN CHANGDER
328. VR stands for:
333. What type of multimedia format would
A. virtual reality
show you how to properly make your
B. visual response bed?
C. video raster A. Game
D. variable rate B. Website
E. valid registry C. Presentation
D. Tutorial
329. Which of the following is considered an
event-driven scripting language? 334. Which of the following plug-ins was de-
A. C++ veloped by Microsoft & is a software de-
velopment tool used to write & run Inter-
B. C
net applications?
C. JavaScript
A. Flash Player
D. Java B. Windows Media Player
330. The technology of electronically captur- C. Silverlight
ing, recording, processing, storing, trans- D. QuickTime
mitting, and reconstructing a sequence of
still images representing scenes in motion. 335. What is defined as a personal website or
A. Audio social media account where a person regu-
larly posts short videos?
B. Video
A. E-Mail
C. Graphics
B. Facebook
D. Text
C. Vlog
331. In phase the multimedia developers D. Youtube
will use a Checklist to test the multimedia
program. If there are any errors, the pro- 336. Select the multimedia element. *.swf
grammer will fix the program. *.gif are the file format for element.
A. Design A. Audio
B. Evaluation B. Video
C. Implementation C. Animation
D. Publishing D. Graphic
337. The use of media including text, graphics, 342. Which of the following methods is not the
video and sound elements of an application audio generation method
to provide links to related content in a mul-
NARAYAN CHANGDER
353. GIF stands for?
B. Animation
A. Graphic Interconnection File
C. Audio
B. Graphical Interface Format
D. Multimedia
C. Graphic Information Format
349. Slide shorter view displays of the D. Graphics Interchange Format
slide.
354. An assembly of people with a common
A. thumbnails
internet interest where they become the
B. template main means of mass communication.
C. view A. PEOPLE MEDIA
D. property B. INTERNET
350. You use a proprietary Windows-based C. MESSAGES
program to create designs and layouts for D. MULTIMEDIA
your freelance greeting card business. You
want to share samples of your work on 355. The process of making a static image look
your Web site for potential new customers like it is moving.
to review. You convert the file format of A. text
your designs so that customers can view
accurate renderings of them, regardless B. animation
of the local operating system, settings or C. audio
browser each individual uses to view your
D. video
site. Which file format should you use?
A. OGG 356. Computer based training is a
B. DOC A. Software product
C. MP3 B. Educational product
D. PDF C. Entertainment product
D. Information product
351. Mr. Luis gave an assignment to his stu-
dents by making a data analysis. 357. The language used to define the structure
A. Text Material of web pages is called
B. Photo & Still Images A. CSS
C. Audio Files B. JavaScript
D. Video Presentation C. HTTP
E. Infographic D. HTML
358. To check the sound card/device available 363. provide a visual programming ap-
in a computer, go to proach to organizing and presenting mul-
timedia.
B. Playback video 374. The following are films that have been
C. Streaming video produced using Adobe Primere Pro soft-
ware except.
D. Playing video
A. doraemon
369. Produced by vibration, perceived by the B. Dust To Glory
sense of hearing.
C. Superman Return
A. audio
D. Captain Abu Raed
NARAYAN CHANGDER
B. animation
C. graphics 375. Which image file type is a replacement
for GIF or TIFF files?
D. text
A. PSD
370. Which of the following is not one of the
B. JPEG
5 elements of multimedia formats?
A. Audio C. PNG
B. Video D. PDF
C. Standards-based plug-ins that play 386. The internet was off and you needed to
streaming audio & video communicate with your mom immediately,
D. Algorithms used by video & audio so you messaged her in another way.
player plug-ns to compress & decompress A. Text Material
files
B. Photo & Still Images
382. This refers to applications that are used C. Audio Files
for integration and creation of links, docu-
ments, and data sets. D. Video Presentation
388. What is the term for an algorithm used by D. images composed of grids of pixels
HTML5 to compress & decompress files? that have a fixed resolution and cannot be
A. Codec resized without losing image quality
B. Plug-in 393. JPEG is a file format for
C. Add-on A. animation
D. Viewer B. audio
389. Which of the following scripting lan- C. graphic images
NARAYAN CHANGDER
guages is vendor-specific to Microsoft and D. video
may not be supported by browsers other
than Windows Internet Explorer? 394. Which is not the characteristic of multime-
A. JavaScript dia systems?
B. VBScript A. They must be computer-controlled
C. JScript B. They are segregated
D. LiveScript C. The information they handle must be
represented digitally
390. You and your friend are having fun with
the memes that are moving. D. The interface to the final user permits
interactivity
A. Text Material
B. Photo & Still Images 395. This is an image or visual representation
C. Audio Files of an object.
D. Transforming A. video
B. animation
401. What is the main purpose of the media?
C. storyboard
A. To convey information
D. audio
B. To post on social media
C. To post on social media 407. Which of these are types of media?
D. To make people angry A. Books
409. What is file format for audio of multime- C. Upgrade RAM and disk storage space
dia element D. Local Ethernet system
A. adu
414. Which of the following transaction is NOT
B. aiff facilitated by the Multimedia Database
C. aip Management System?
D. gulp A. Interfere
B. Query
NARAYAN CHANGDER
410. What is the first full-length motion pic-
ture made entirely with computer anima- C. Control
tion? D. Storage
A. Tom and Jerry 415. interactivity is a two-way communi-
B. Pokemon cation process.( Data sent in both direc-
tions i.e. input and output)
C. Toy Story
A. Linear
D. Donald Duck
B. Hypertext
411. Both local area networks (LANs) and C. Non-linear
wide area networks (WANs) can connect
the members of a workgroup, but D. Multimedia
workstations are located within a short 416. a visual image such as a chart or di-
distance of one another. agram used to represent information or
A. MANs data.
B. WiFi A. Clip art
C. WANs B. Maps
D. LANs C. Infographic
D. none of above
412. This question must be asked when deter-
mining the credibility of an information us- 417. If you were asked by your English teacher
ing the URL domain extension. to write an essay about the things that
you have done last Christmas vacation,
A. Who created the message?
what resource would you likely use?
B. What is the format of the website?
A. text
C. What is the purpose of disseminating B. audio
such information?
C. video
D. What message is being sent?
D. animation
413. If you are working in a multimedia devel-
418. Two scanning technologies used by video
opment environment consisting of a mix-
display are
ture of Macintosh and Windows comput-
ers, how do you want them to communi- A. interlaced and massive scan
cate with each other? B. interlaced and progressive scan
A. ‘Clone’ Macintosh to run in Windows C. progressive and frame scan
B. Convert Windows to Macinstosh D. interlaced and quality scan
419. Data is inserted in different locations on 424. The presentation of a (usually interac-
a power point slide called tive) computer application, incorporating
media elements such as text graphics,
NARAYAN CHANGDER
430. Which of the following is an example of C. May be
an input device?
D. Don’t Know
A. Speaker and headphone
B. Blu-ray discs 436. Multimedia is thus interactive assis-
tance in developing student’s skills by ed-
C. Microphone ucating and informing them. Its compo-
D. LED screen nents are:Data and Information (text, im-
ages and video that combine to produce
431. Placing an uppercase letter in the middle structured activities the user views as in-
of a word is referred to as formation, more emphasis will be on text-
A. lowercase based information), Participants (teachers
B. intercap and students, parents and siblings, they
will also be using the system), IT (high
C. uppercase resolution VDU, audio speakers, CD/DVD
D. middlecase drive, sufficient RAM and reasonably fast
processor, keyboard and mouse for chil-
432. HTML controls the of a web page. dren’s click n drag, headphones) and Re-
A. content lationships (the direct user, the students
who are also the participants, will con-
B. appearance
trol the path taken through applications as
C. speed they select from the interactive menu via
D. cost a mouse or keyboard and use the multime-
dia CD to their own need, speed and pref-
433. Software that you need include: erence).
A. Text Editing and Word Processing A. education
Tools
B. games
B. Objects
C. immersion
C. OCR Software
D. entertainment
D. Painting and Drawing Tools
E. Organizing Features 437. A browser is used to view:
A. program code
434. While watching Marvel’s Avengers, you
found the graphics amazing. B. storyboards
A. Text Material C. fonts
B. Photo & Still Images D. Web-based pages and documents
C. Audio Files E. videodiscs
438. What is the file type that Google Chrome 443. Which of the following computer is able
extensions use? to handle multimedia?
439. This multimedia is used as data display 444. are additional indispensable tools for
projectsin which your source material may
A. Animation
originate on Macintoshes, PCs, Unix work-
B. Video stations, or even mainframes
C. Movie A. voice recognition systems
D. Graphic B. digital cameras
448. Adobe Flash is an example of editors 453. This is a personal website or social me-
for editing special effects dia account where a person regularly posts
A. video short videos
B. audio A. Blog
C. graphics B. Podcast
D. animation C. Vlog
D. PowerPoint Presentation
NARAYAN CHANGDER
449. Which of these is NOT likely to be the re-
sponsibility of a multimedia designer? 454. Which one below is NOT an analog broad-
A. Select media types for content. cast video standard?
B. Ensure the visual consistency of the A. NTSC
project. B. SECAM
C. Analyze content structurally. C. PAL
D. Integrates all the multimedia ele- D. HDTV
ments into a project.
455. All of the following are ecommerce risks
450. The ability to superimpose one clip over
for customers, except one. Which of the
another is a valuable technique with green
following is NOT an ecommerce risk for
screening is called
customers:
A. chroming key
A. Possible Security Issues
B. chrome key
B. Possible Privacy Issues
C. chroming
C. Purchasing from photos & descrip-
D. chroma key tions
451. The better your or typing skills, D. Convenience
theeasier and more efficient your multime-
dia day-to-day life will be. 456. Which statement is true?
458. If you are “media literate”, you can D. This include how media is used during
A. create a post on Facebook Pre-historic age, Industrial age, Informa-
tion age, Electronic age.
NARAYAN CHANGDER
C. on a website / presentation D. USB
D. on a fax
E. Blu-ray Discs
469. or special effects, such as crystal-
lize, dry brush, emboss, facet, fresco, 474. Memory is primarily of types
graphic pen, mosaic, pixelize, poster, rip-
A. Cache Memory
ple, smooth, splatter, stucco, twirl, water-
color, wave, and wind B. Harddisk
A. filters
C. Primary Memory/Main Memory
B. effect
D. Secondary Memory
C. tricks
D. magical 475. This is a location connected to the Inter-
470. A barcode reader can net that maintains one or more pages on
the World Wide Web.
A. scan graphic into a computer
B. read universal product code (upc) pat- A. Tutorial
terns B. Print media
C. recognize spoken words when trained
C. Website
D. provide sharp and detailed image res-
olution D. Game
471. Anna reduced her image file size from 3.5 476. Augmented reality is a
MB to 200 KB. This refers to what format
factor? A. Software product
A. Compression B. Educational product
B. Transparency C. Entertainment product
C. Color Depth
D. Information product
D. Portability
472. What application would be best for ana- 477. The expansion for MIDI is
lyzing data?
A. Musical Instrument Digital Interface
A. Spreadsheet
B. Musical Instrument Data Interface
B. Presentation software
C. Word processing C. Musical Instructions Digital Interface
D. None of the above D. Musical Information Data Interface
480. Which of these is the keyboard shortcut 486. Alex wants to email some of his photos
to add a new slide? to his clients. What image file type does
he used?
A. ctrl+ m
A. JPEG
B. ctrl+ n
B. PNG
C. ctrl+ c C. PDF
D. ctrl+ s D. TIFF
481. The building blocks of project manage- 487. This multimedia component can function
ment are as a musical background to images and
A. budgets photographs, and even texts.
B. tasks A. text
C. proposals B. audio
C. animation
D. milestones
D. graphics
482. Media that allows active participation by
the user or viewer. 488. A computer output on a CRT is calibrated
to display an image
A. rich media
A. smaller than the actual monitor’s capa-
B. tutorial bility
C. game B. larger than the actual monitor’s capa-
D. interactive media bility
C. that adjusts automatically to the moni-
483. What unit of measurement is equal to
tor’s capability
1/72 of an inch?
D. which can be it is larger or smaller
A. Inches than the monitor’s capability depending
B. Pixels on the monitor
489. These are characters that are used to cre- 494. All are components of multimedia, EX-
ate words, sentences, and paragraphs. CEPT one.
A. Audio A. Graphics
B. Graphics B. Internet connectivity
C. Text C. Sound
D. Animation D. Text
NARAYAN CHANGDER
490. This is a presentation of a series of still 495. , such as Photoshop, Fireworks, and
images on a projection screen or electronic Painter, isdedicated to producing crafted
display device, typically in a prearranged bitmap images.
sequence. A. Drawing software
A. PowerPoint presentation B. Animation Tools
B. Vlog C. Painting software
C. Podcast D. Animation Tools
D. Blog
496. Also known as printer resolution. The
491. It is a combination of all kinds of media number of dots of color a printer is capable
such as text, speech, sound, graphics or of producing in a certain amount of space.
images, animation and video. A. Digitisation
A. MULTIMEDIA B. Dots per inch
B. COMMUNICATION C. Digital effects
C. LITERACY D. Copyright
D. ANIMATION 497. People use online platforms for make
492. According to one source, in interactive their daily activities easier; therefore, E-
multimedia presentations where you are commerce website is for
really involved, the retention rate is as A. business to business transactions and
high as: business to consumer transactions
A. 20 percent B. getting money from your computer on-
line
B. 40 percent
C. selling your home on the net
C. 60 percent
D. a revolution in business practices
D. 80 percent
E. 100 percent 498. Multimedia enhances the information for
499. Which of the following is NOT database A. Plug-ins load an entire file at once and
types? deliver the information as a continuous
stream of data.
509. It is one of the common multimedia op- 514. General name for operations performed
eration of a sound editor that is used to on an image using graphics software.
delete any blank space from the beginning A. Typography
and end of the recording
B. Resolution
A. Digitizing
C. Flipping
B. Sampling
D. Filters
C. Trimming
NARAYAN CHANGDER
515. Any combination of text, graphics, sound,
D. None of the Above
animation, and video that is delivered in-
510. The shapes feature is used to insert teractively to the user by electronic or dig-
shapes such as rectangles and arrows on itally manipulated means
the slide. A. multimedia
A. True B. video
B. False C. video streaming
C. May be D. animation
NARAYAN CHANGDER
contents 11. What is the minimum resolution required
for a video to be considered as high defini-
B. User is not a passive receiver of the
tion (HD)?
multimedia content most of the time.
A. 640 x 360
C. User interacts with the multimedia ap-
plication without controlling the progress B. 720 x 480
of the content C. 1024 x 768
D. User interacts with the multimedia ap- D. 1280 x 720
plication by controlling the progress of the
content 12. Layla is creating a presentation to high-
light her company’s latest product. It’s a
7. What occurs when you drag an animation very long presentation, and she wants to
in the Animations pane of your presenta- be sure it’s as perfect as she can make it.
tion software? What step does she need to take before
submitting it to her boss?
A. You add an animation to a slide.
A. Make the font different for every slide,
B. You attach multiple animations to an to add interest.
object.
B. Add music or videos so it doesn’t get
C. You change the order of animations. boring.
D. You control how each slide replaces C. Use the spell-check and automatic cor-
the previous one. rections tools to check for spelling, gram-
mar, and punctuation.
8. is a collection of text, graphics, sound,
animation and video clips. D. Change the formatting using a slide
master.
A. Multimedia
13. Family of graphics that include many type
B. media
sizes and styles.
C. monitor A. Font
D. none of above B. Typeface
9. To give credit for the original C. Multimedia
it’s the only presentation software avail- 18. Presentations can be used by business to
able. What should Mark tell Jim? present information, as well as
17. To delete a slide, simply hit the button 22. Online courses that simulate the classroom
on the keyboard. online (e.g., E-learning).
A. Tab A. Courseware
B. Space Bar B. Online Games
C. Delete C. Podcast
D. none of above D. Vodcast
NARAYAN CHANGDER
24. Multimedia and the internet have provided A. Interactive Multimedia
new ways of teaching and learning, such B. Podcast
as Distant learning for virtual classrooms
or on-line schools and CBT models that al- C. c.Music
lows people to learn at their own pace. D. d. Games
What does the acronym CBT stand for?
A. Customized Based Training 29. Online Research
B. Computer Based Technology A. requires the use of wireless networks,
C. Computer Based Training hubs, and the Internet
D. Come Back Tomorrow B. involves collecting information from
the Internet
25. A family of graphic characters that usual-
lyincludes many type sizes and styles is C. the study of materials and sources in
called a: order to establish facts and reach new
conclusions
A. typeface
D. one behind the other (socially dis-
B. font
tanced of course) waiting to pay for your
C. point groceries
D. link
30. Pokemon Go is the best example of what
E. node
technology?
26. Meeting of the eyes between two people A. IoT
that expresses meaningful nonverbal com-
munication B. AI
A. visual aid C. AR
B. animation D. FinTech
C. eye roll
31. The use of multimedia in various maga-
D. eye contact zines and newspapers that are published
27. What feature should you add to the multi- periodically.
media in your presentation for people who A. Government
might have trouble seeing multimedia con-
tent? B. Science and Technology
A. business C. .bmp
B. Adevertisement D. .wav
C. education 39. Which of the following is a multimedia au-
D. agriculture thoring tool?
A. Adobe Acrobat Reader
34. The people giving or likely to give atten-
tion to something B. Adobe Director
A. audience C. Adobe Photoshop
B. visual aid D. CorelIDRAW
C. presenter 40. In linear interactivity
D. background
A. User can control over the progress of
35. The acronym URL stands for Universal Re- the content and they need to follow the
source Locator and is used by a search en- contents page by page.
gine to find a websites’ B. User have no control over the progress
A. owner of the content and they need to follow the
contents page by page.
B. service provider
C. User can control over the progress of
C. address
the content and they need to follow the
D. country of origin contents page by page.
36. is used to store and deliver multimedia D. User have no control over the progress
programs due to its capability of storing of the content and they dont need to follow
large files. the contents page by page.
A. Web page 41. When searching the web, you can use
B. The Internet that include keywords to find the right
web page.
C. Compact disc
A. search engines
D. Video tape
B. search queries
37. Most Movies design is presented linear in-
teractivity. Draw a diagram of linear in- C. chat rooms
teractivity D. plug-ins
42. What tab do you click to change the back- 47. are visual images or designs on some
ground of your slide? surface, such as a wall, canvas, screen, pa-
per, or stone, to inform, illustrate, or en-
A. Design
tertain.
B. Home A. Video game
C. Insert B. Graphic
D. Transition C. Media
NARAYAN CHANGDER
D. Multimedia
43. Double-click, icon in the CD to install
it. 48. A computer program designed to simulate
A. Computer conversation with human users over the
internet.
B. Documents
A. Chatbots
C. Setup B. Robots
D. none of above C. Bots
NARAYAN CHANGDER
66. Flash is used for delivering rich multimedi-
62. The following list is under the element of acontent to the Web
multimedia EXCEPT
A. Score
A. text
B. Time-Based Tools
B. audio
C. Macromedia Director
C. graphic
D. Macromedia Flash
D. movie
67. Which of the following is an advantage of
63. Multimedia becomes interactive multimedi- surround sound?
awhen:
A. Having smaller file size
A. the user has some control over what in-
formation is viewed and when it is viewed B. Boosting the degree of immersion of
the audio experience
B. the information is displayed by a com-
puter with a touchscreen or other input C. Allowing the sound to be played on
device more platforms
C. the information is available on the D. Garbled text will be displayed
Web-either the Internet or a local area
network 68. Which image file format supports trans-
parency, and animation?
D. quizzes and tests with evaluations and
scoring are included A. GIF
71. Computers can interpret information like 76. Up to what percentage does multimedia re-
humans and intelligently generate and dis- tain audio/video?
tribute useful content tailored to the needs A. 10%
of users.
B. 20%
A. Web 1.0 C. 30%
B. Web 2.0 D. 60%
C. Web 3.0
77. Where can a presenter view and keep
D. Web Gen X track of the amount of time spent on a
slide?
72. graphic file format is
A. The Speaker Notes window
A. .mpeg
B. The Presentation window
B. .jpeg
C. The Status bar
C. .wmv
D. The View menu
D. .pdf
78. the web makes it easy to build web
73. The advantage of interactive multimedia browsers for a wide ranges of devices.
A. Information can be delivered more ef- Web browsers have been deployed on cell-
fectively phones and personal organizers and the
web now the standard interface for pro-
B. Support the development of Internet
viding access to information.
technology and network
A. None from the choices
C. Make the application user friendly and
attractive B. Universal access
D. Presentation and reception of informa- C. Ease of use
tion is easier, effective and interactive D. Search capabilities
74. Not a platform for an interactive multime- 79. The word multimedia comes from two
dia product words
A. Computer A. many media
B. Smart Phone B. Multi and Medium
NARAYAN CHANGDER
C. content
cent in time?
D. background
A. The personal computer
81. In multimedia authoring systems, multime- B. The World Wide Web
dia elements and events are often treated
as C. The browser
D. All of the above
A. item
B. objects 87. During what stage of Interactive Media
Authoring would an author edit and create
C. attributes
an Interactive Media Application?
D. script
A. Planning
82. The advantage of using a digital camera B. Design
compared to analog cameras are able to C. Development
store directly to the computer
D. Production
A. Image
B. Animation 88. The following are examples of POS kiosks
EXCEPT
C. Audio
A. Path finding kiosk
D. Vector
B. Topup and pay bills kiosk
83. Using a multimedia authoring software, C. Instagram kiosk
one can develop all the applications below
D. Airport self check-in kiosk
EXCEPT
A. Interactive websites 89. Words in multimedia can be sung, spoken
or
B. Kiosk application
A. drawn
C. Simulation
B. texted
D. Audio production
C. written
84. A sequence of slides that usually incorpo- D. signed
rate multimedia elements is called a
90. Where can a presenter insert notes she
A. print publications
or he wants to remember about specific
B. graphics slides?
C. presentation A. The Status bar
D. web page B. The View menu
C. The Speaker Notes window or Slide 95. this is programming using cues, icons, an-
Notes dobjects. It is done using drag and drop.
To include sound in yourproject, drag and
99. Sound, also called Audio, in multimedia can 104. Photo essay of your community service
be Voice-over, narration, sound effects or A. newspaper
B. pictures
A. a band
C. graph
B. a choir
D. internet
C. music
D. None of the above 105. Adobe Premiere, Ulead Video Studio,
NARAYAN CHANGDER
Movie Maker, Flash Video Encoder are ex-
100. Drawing, chart, diagram, painting, pic- ample for
tures or photographs are all examples of A. Text Editor
B. Graphic Editor
A. images
C. Audio Editor
B. graphics
D. Video Editor
C. medium
E. Animation Editor
D. animation
106. Dynamic HTML uses to defnechoices
101. A multimedia computer is a computer that ranging from line height to marginwidth to
is capable of playing font face.
A. sounds A. Cascading Style Sheets
B. piano B. font mapping
C. guitar C. font substitution
D. none of above D. software robots
102. Multimedia means E. encapsulated PostScript
A. Programmed that contain animation 107. In the URL http://www.timestream.com/info/people/biota
B. The information system that based on which part is casesensitive?
the latest computer A. the record type:“http://”
C. The combination of text, images, audio B. the domain name:“timestream.com”
and video to convey information
C. the subdomain “www”
D. Material that combines all the ele-
ments(text, grahic, audio, video, anima- D. the document path:“info/people/biotay/biotay1.html”
tion) to deliver interactive multimedia in-
formation E. all are case sensitive
103. Website allowing students to create ani- 108. Including interactive features may make
mated presentations. your presentation easier to use for
A. Presentation A. Young children
B. iMovie B. Disabled users
C. Powtoon C. Users who speak a different language
D. PowerPoint D. All of the above
109. The use of multimedia that is very much 114. “media” in Multimedia refers to
present in many modern movies and ani- A. any hardware or software used for
mations to develop special effects and vir- communication
120. Which one is the classification of Multi- 124. Based on multimedia concept, media
media? refers to
A. Audio A. Internet and TV
B. Image B. Whatsapp, Facebook, Twitter and etc
C. Text C. Text, graphic, audio, video and anima-
D. All answers are correct tion
D. none of above
NARAYAN CHANGDER
121. The reference from one document to an-
otherdocument, image, sound, or fle on the 125. ‘Andy is a non-technical multimedia au-
Web isa(n): thor who needs to build a sophisticated
A. sweetspot application without scripting or program-
ming’. Which of the following types of
B. anchor authoring tools is the most suitable for
C. node Andy?
D. tag A. Time-based tools
E. button B. Card or Page-based tools
NARAYAN CHANGDER
C. Economic
139. In Director, still images, sound files, text,
palettes, QuickDraw shapes, program- D. Secondary
ming scripts, QuickTime movies, Flash 144. It is the use of multimedia to create and
movies, and even other Director files are produce computer-based training (CBT)
stored in multimedia database known as materials and courses, including online.
A. Entertainment
A. Score
B. Medicine
B. Cast
C. Education
C. Stage
D. Business
D. Lingo
145. Any kind of communication over the in-
140. Multimedia elements are divided into ternet; primarily meant to refer to direct
two, namely, static and dynamic. Which one-on-one talk or text based group talk
of the following elements are static ele-
A. Chat
ments?
B. Clip
A. Video
C. Body Language
B. Audio
D. Email
C. Graphic
D. Animation 146. Programming in which some authoring
tool provide very high level scripting lan-
141. Which one of the following is not/are guage and interpreted scripting environ-
nottypically part of a multimedia specifi- ment
cation? A. Programming with traditional lan-
A. text guage such as Basic or C
B. odors B. Visual programming
C. sound C. Programming with scripting language
D. video D. none of above
E. pictures 147. Example of Homebot?
142. WHAT IS MULTIMEDIA? A. Alexa
A. social media such as Instagram B. Adarna
B. more than one way of conveying infor- C. Amazon
mation D. Arriana
156. Which method below will allow you to 160. Which of the following is a typical
rearrange the order of your slides to en- method for word searching in a hyperme-
sure the overall flow of your presentation dia system?
makes sense? A. best ft
A. Right-click the slide in the slide thumb- B. adjacency
nail panel, select Delete Slide, select the
C. popularity
new location and then click New Slide.
D. tracking
B. Drag the slide thumbnail to its new lo-
NARAYAN CHANGDER
cation in the slide thumbnail panel. E. localization
C. Right-click the slide in the slide thumb- 161. Which is the correct flow of testing?
nail panel and then select Change Loca- A. alpha testing→beta testing→delta
tion. testing
D. Select the slide thumbnail in the slide B. beta testing→delta testing→gamma
thumbnail panel and then use the UP or testing
DOWN arrows.
C. alpha testing→beta testing→final re-
157. A multimedia CD must be properly be- lease
fore its usage. D. beta testing→delta testing→final re-
lease
A. installed
B. checked 162. When developing your personal web
page you may use all of the following EX-
C. fitted CEPT
D. none of above A. text
158. How many attributes does multimedia B. videos
has? C. inappropriate pictures
A. 3 D. sounds
B. 2 163. provides the important framework
C. 4 for organizing and editing elements of
your multimedia project, including graph-
D. 5 ics, sounds, animations and video clips.
159. Which of the following best defines the A. Multimedia development process
interactivity feature in a multimedia au- B. Multimedia skills
thoring tool?
C. Multimedia authoring tools
A. Authoring tools that offer a high level D. Multimedia presentations
language (VHLL)
B. A run time version allows multimedia 164. Which of the following are examples of
projects to playback easily multimedia elements?
A. audio
C. The ability to go to another section of
a multimedia production B. animation
D. Ensure that the multimedia authoring C. text
tool can be used for Internet delivery D. All of the above
NARAYAN CHANGDER
dia
177. A multimedia computer is a computer that A. 2
is capable of showing
B. 3
A. graphics
C. 4
B. colours
D. 5
C. stars
183. Two-dimensional figure or illustration
D. none of above
could be produced manually by drawing,
178. The use of multimedia to train future doc- painting or computer graphics technology.
tors and medical practitioners for example A. video
in virtual surgery.
B. animation
A. Mathematics and Science Research
C. text
B. Government
D. graphics
C. Medicine
184. Comcast, Suddenlink, DirectTV and Dish
D. Entertainment
Network are all examples of
179. ‘If you develop on a Macintosh, look for A. Internet Service Providers (ISP)
tools that provide a compatible authoring
B. Business to Business (B2B)
system for Windows or offer a run-time
player for the other platform’. What kind C. File Transfer Protocol (FTP)
of authoring features are referred to in D. Computer Based Instructions (CBI)
above statement?
185. Which one are audio file format?
A. Performance Tuning Features
A. .txt
B. Delivery Features
B. .mp3
C. Cross-Platform Features
C. .avi
D. Internet Playability
D. .jpeg
180. Simulations are computer based models
of situations 186. Which of these descriptions works as a
definition for Video assets?
A. fantasy-world
A. A sound based asset with text added
B. make-believe to help the user
C. real-life B. An image based asset with sound used
D. three-dimensional to convey information
C. An animation based asset with sound 191. He is responsible for recording and edit-
used to inform users of simple or complex ing sounds or sound effects and also re-
information sponsible for recording and editing video.
196. For linear interactivity 201. A film that combines sound, graphics and
animation can be considered as interac-
A. The multimedia layers are usually ar-
tivity which not allowing user control and
range in sequence.
change the contents.
B. The multimedia contents are usually
A. Linear
arrange in series
B. Graphic
C. The multimedia contents are usually
arrange in sequence. C. Animation
NARAYAN CHANGDER
D. The multimedia layers are usually ar- D. Non linear
range in series
202. Example of linear interactivity is
197. A is necessary for a multimedia sys- A. Montage
tem. B. Webpage
A. sound card C. Games
B. memory card D. interactive e-book
C. post card
203. A is a collective of web pages.
D. none of above
A. website
198. Removing a part of an image is called? B. Home page
A. Transforming C. Digital Citizen
B. Cropping D. none of above
C. Selection 204. Which of the following is NOT a multime-
D. Fill dia component?
A. Text
199. The web can be immediately used by any-
one already familiar with a computer win- B. Images
dow. C. Video
A. Universal access D. PowerPoint
B. Ease of use 205. It covers any communication device or
C. Search capabilities. application including radio, TV, cellular
phones, computer and network hardware
D. None from the choices and software, as well as various applica-
tions.
200. The integration of interactive elements
such as text, graphics, animation, audio A. Multimedia
and video using computer technology. B. ICT
A. Multimedia C. Digital Media
B. Interactive media D. Social Media
C. Audio
206. What are the 3 different types of pro-
D. Richmedia gramming approach?
209. Connecting to the internet, browser soft- 214. Which device allows us to communicate
ware, might need programs to retrieve with other computer?
some types of media applications.
A. Pen drive
A. plug-in
B. Hard disk
B. plug-out
C. Modem
C. virus
D. Webcam
D. anti-virus
215. Which action is used to remove parts of
210. Which og these can we add to the “Back- an image that you do not want to show in
end” list? your presentation?
A. database A. Resize
B. web browser B. Reset
C. computing device C. Delete
D. mobile application D. Crop
216. Web-based multimedia is a combination C. leave a blank space where that text is
of multimedia technology and technol- D. crash
ogy
E. try to substitute the font with a similar-
A. Communication looking font
B. WAN
220. Which of these would not be an interac-
C. Interactivity tive feature
D. Internet A. Control buttons
NARAYAN CHANGDER
217. Choose the most correct answer to ex- B. Videos
plain the application of multimedia in ed- C. 3D tour
ucation.
D. Accessibilty tag (ALT Text)
A. Courseware-Any educational material
intended as kits for teachers or trainers E. Text
or as tutorials for students, usually pack- 221. Action Script which is based upon the in-
aged for use with a computer ternational ECMAScript can be found in
B. Computer Based Training-An informa- A. Adobe Flash
tion system that involves the E-learning.
Eg:WebCT B. Adobe Director
A. Advertisement A. Text
B. Education B. Graphic
C. Entertainment C. Audio
D. Industrial D. Video
E. Animation
219. If a DHTML document includes a font
facethat is not installed on the user’s com- 224. In 1996, users reached 45 million glob-
puter, abrowser will: ally, This has been recognized as “the
A. automatically download the correct most read-only web”
font A. Web 1.0
B. refuse to load the page B. Web 2.0
233. The process of communicating nonver- 238. Images in multimedia can be all of
bally though conscious or unconscious ges- the following EXCEPT which of the fol-
tures and movements lowing:Drawings, Paintings, Photographs,
Buttons and
A. eye contact
A. Animations
B. body language
B. Video
C. mind control
C. Diagrams
D. magic
NARAYAN CHANGDER
D. USB cable
234. A series of illustrations or images dis-
played in sequence 239. What is the best method to use when you
want to share a presentation but are not
A. a bedtime story sure of whom to include in the target audi-
B. multimedia presentation ence?
B. CD based A. arts
B. Safari B. boring
C. Firefox C. funny
D. none of above
D. Bing
242. Janet is representing her company at a
237. Multimedia has become a valuable re-
job fair. They have a presentation running
source in society. It is used for Leisure,
on a small TV screen, which Janet wants
Recreation, Business and
to repeat on its own throughout the day.
A. Travel Terry told her to just manually restart the
slide show from the beginning each time it
B. Social media
ends. What should Janet tell Terry?
C. Education
A. Modify the presentation’s setup to ad-
D. None of the above vance slides ‘on click’ works better.
A. Tooltips A. Text
B. Icons B. Graphic
C. Font C. Audio
B. CD player C. PPT
C. DVD player D. CS
D. none of above
258. Electronic Commerce allows business’ to
253. Definition of interactive multimedia sell products and services to consumers all
over the globe. What does the acronym
A. a technique used to publish various
B2B refer to?
media
A. boy to boy commerce
NARAYAN CHANGDER
B. a technique used to integrate various
media B. black to black commerce
C. a technique used to disseminate vari- C. business to business commerce
ous media D. buy to buy commerce
D. a technique used to apply various me-
dia 259. What tab allows us to insert pictures?
A. insert
254. Sound other than speech or music made
artificially for use in a presentation B. home
A. Sound effect C. design
B. Overlay D. animation
C. Video
260. What can be added in slide presentation
D. Import Files so that it can be interactive?
255. Using live or recorded sound to help en- A. Animation
gage users and provide information, which B. Navigation buttons
includes voice-over or narration, sound ef-
fects, and music. C. Sound
A. Graphics D. Video
B. Tutorials 261. Analog camcorders record a video in ana-
C. Video log form and stores it in
D. Audio A. Magnetic Tape
B. DVD
256. Planned combination of colors for a pre-
sentation C. CD-RW
A. overlay D. Memory Card
B. floor plan
262. Engineers design cars before producing
C. paint pallet them by using a multimedia application
D. color scheme called
A. Computer-Aided Design
257. This command hides the turtle from the
screen B. Computer-Aided Coding
A. HT C. Computer-Aided Development
B. ST D. Computer-Aided Documentation
263. The first Personal Computer (PC) is 268. In MSW Logo Procedure is a set of
A. Multimedia A. Commands
A. the information is available on the 278. What is the name of a sequence of im-
NARAYAN CHANGDER
Web-either the Internet or a local area ages, which is defined as the display of
network recorded real events on a television-type
B. quizzes and tests with evaluations and screen?
scoring are included A. sound
C. it includes a structure of linked ele- B. video
ments through which a user can navigate C. image
and interact
D. text
D. the user can change such attributes as
volume and type size 279. Web pages can be used for various rea-
sons to include entertainment, informa-
E. the content formatting complies with
tion, reference, research and use the
the American Standard Code for Informa-
acronym (TIRRE)
tion Interchange
A. Tutorials
274. Computers have become smaller, cheaper
B. Training
and
C. Tele-commuting
A. less powerful
D. Tele-conferencing
B. less expensive
C. more expensive 280. In which university was the use of this
tool allowed?
D. more powerful
A. Yale
275. Facebook Disadvantage B. UCLA
A. Responsibility C. Harvard
B. I respect D. Princeton
C. Gossip 281. Mirna wants to use an image that she
D. Not always focused on education found online as the logo for her business.
Which statement is true about using the
276. Which of the following extensions is a image?
movie file? A. She must obtain permission and then
A. JPEG pay a fee to reuse any image she finds on-
line.
B. PUB
B. She can reuse the image without ob-
C. PSD
taining permission because she found it
D. MP4 online and not in print.
292. What is multimedia interactivity? 294. The multimedia project format which gen-
A. The way users interact with a com- erally combines all multimedia elements
puter application or program. for the purpose of entertaining partici-
pants.
B. The way users communicate with a
multimedia television A. Video Games
C. The way users interact with a multime- B. Tutorials
dia application or program.
C. Web Sites
NARAYAN CHANGDER
D. The way users interact with a multime-
dia programmer and staff D. Simulations
293. It is a combination of text, animated 295. Music, speech or other forms of noise are
graphics, video and sound delivered to you examples of elements
via electronic means.
A. Text
A. Online Environment
B. Digital Multimedia B. Video
C. Interactivity C. Audio
D. Multimedia D. Animation
9.1 Introduction
1. WHAT IS COMPUTER SECURITY 4. What is phishing?
A. measures to protect data during trans- A. Sitting on a lake shore and trying to
mission across the network. catch trout
B. generic name for the collection of tools B. Someone trying to gather personal in-
designed to protect data and to prevent formation through scams
hackers. C. Emails from your favorite store adver-
C. measures to protect data during their tising their big sale
transmission over a collection of intercon- D. Texts from your friend asking if you’d
nected networks like to meet at the volleyball game
D. none of above
5. What is the system used for realtime and
2. What is Spam? storing Cisco logging to a central source
A. Log Level Storage
A. known as junk mail
B. Syslog
B. spam is used as a method of helping
people C. Central Log Server Management
(CLSM)
C. spam can be used to send usefull links
D. Cisco Logger Package (CLP)
D. nice website
6. is a program that can infect other pro-
3. The process of converting a ciphertext into grams by modifying them to include a copy
plaintext. of itself
A. encryption A. HACKING
B. decryption B. VIRUS
C. plaintext C. DENIAL OF SERVICES
D. cryptography D. none of above
NARAYAN CHANGDER
messages to trick the user into following
A. WIred malicious links.
B. Wireless C. A type of malware which is disguised
C. Mobile as legitimate software
D. none of above D. A type of malware which secretly mon-
itors and records user actions.
9. Find what do domain controllers do?
14. It is a software code that is deliberately
A. Store the database, maintain the poli-
created by an attacker.
cies and provide the authentication of do-
main logons. A. Virus
B. Control granular settings in a domain B. worm
environment. C. Trojan
C. Receive and relay domain commands D. Rootkit
D. none of above 15. A check to make sure that a computer or
10. This Malware interferes with the opera- user is who/what it says it is.
tion of the computer or threatens to do so, A. SSL Certificate
unless a sum of money is paid. B. private key
A. Worms C. authentication
B. Viruses D. public key
C. Root Kits
16. Who has the highest access level to data
D. Ransomware in school?
11. Where does the name malware come A. The teachers
from? B. The principal
A. Maleficent Software C. The IT technicians
B. Magnificent Hardware D. The students
C. Malicious Tools
17. Internet connection speeds are most com-
D. Malicious Software monly measured in
12. Firmware is A. Megabits per second
A. hardware unit B. Packets per second
B. is software that is embedded in a piece C. Gigabytes
of hardware D. Megahertz
18. To guard against malware, you will need servers for packetinspection. Which of the
to have following is not used for this?
19. Which file name uses best practise 24. Why would you use a custom route in a
virtual network?
A. csnd.mp4
A. To load balance the traffic within your
B. Car$ound.mp4
virtual network.
C. carsoundusedforlevel1.mp4
B. To connect to your Azure virtual ma-
D. CarSound.mp4 chines using RDP or SSH.
20. Find what option can you use to pre- C. To connect to resources in another vir-
vent deleting a group in Windows Server tual network hosted in Azure.
2008? D. To control the flow of traffic within
A. You could prevent this by formatting your Azure virtual network.
the hard drive.
25. Which of the following uses a number of
B. You can prevent deleting a group by computers over a network of infected ma-
restarting the computer. chines to send requests to a website which
C. Protect object from accidental dele- would bring it offline? [1-3]
tion. A. SQL
D. Use /reboot to prevent deleting a B. USB
group.
C. DDOS
21. What is a Trojan Horse? D. WLAN
A. A horse from Troy
26. What type of malware disguises itself as
B. A virus disguised as something else software that you would like to install?
C. An upgrade for your computer A. Ransomware
D. A way of protecting your computer B. Trojan Horse
NARAYAN CHANGDER
needs to be operating for only one shift DETECT, TO PREVENT OR RECOVER FROM
per day. SECURITY ATTACK
A. MINIMUM REDUNDANCY C. A SERVICES THAT ENHANCES THE SE-
B. MAXIMUM REDUNDANCY CURITY OF DATA PROCESSING SYSTEM
AND INFORMATION TRANSFER
C. MEDIUM REDUNDANCY
D. none of above
D. HIGH REDUNDANCY
35. Function of computer server in networking-
30. What’s the difference between websites oriented services includes
that start with https vs http
A. file sharing,
A. Sites with the S use encryption to keep
data secret B. DNS
B. Sites with the S are more professional C. FTP accounts,
C. Sites WITHOUT the S use encryption D. User Authentication
to keep data secret
36. Replacing devices is
D. Sites WITHOUT the S are more
A. Security management
31. What program allows you to view and in- B. Software management
teract with a user’s sessions while a user
is showing an error? C. Hardware management
A. Remote Desktop D. none of above
B. Remote Assistance 37. How does a worm infect a computer?
C. Control Panel A. E-mail attachments
D. SysInfo B. Through security loopholes, your com-
32. ENTERPRISE SERVER Also known as puter is not up to date
48. software converts data into a form, 52. What program is usually used to connect
called a ciphertext, that cannot be easily to a computer remotely?
understood by unauthorized people A. Remote Desktop
A. System B. Remote Assistance
B. Encryption C. Control Panel
C. Security D. SysInfo
D. Antivirus 53. It is a self-replicating program that uses
NARAYAN CHANGDER
the network to duplicate its code to the
49. Viruses
hosts on the network
A. program written with malicious intent
A. Virus
and sent by attackers. transferred to an-
other computer through email, file trans- B. worm
fers, and instant messaging. C. Trojan
B. malicious program that gains full ac- D. Rootkit
cess to a computer system. Often, a di-
rect attack on a system using a known 54. What type of malware locks up your com-
vulnerability or password is used to gain puter until you pay a fee?
Administrator-account level access. A. Ransomware
C. installed on a computer without the B. Phishing
knowledge of the user. C. Spyware
D. can also collect information stored on D. A worm
the computer without the user’s consent.
55. This connection type is most flexible
50. Firewall can be used A. Wired
A. Block virus B. Wireless
B. Clean disk C. Mobile
C. Compress files D. none of above
D. can be used to filter between trusted 56. Every device connected to a network has
and untrusted networks and prevent pro- an
grams from communicating through the
A. IP address
use of ports
B. PI address
51. Find what default group has the right to C. Internet Address
log on locally, start and stop services, per-
form backup and restore operations, for- D. Postal address
mat disks, create or delete shares, and 57. Name for a cable connecting devices on a
even power down domain controllers? network
A. Server Operators A. Othernet cable
B. Schema Admins B. Ethernet cable
C. Enterprise Admins C. Circuit cable
D. Backup Operators D. Power cable
58. What is Server Management? site asking for personal details and/or
A. SysConf credit card details.
C. *is the maintenance and operation of 63. A the group is a group that contains
a server. the same users as an OU.
D. can vary depending on the time of the A. Operation
server and the purpose B. Administration
59. When utilizing SNMP, which system is the C. Primary
Central Server D. Shadow
A. NMS
64. Peter installing a new feature in his new
B. MIB android apps. This is
C. Agent A. Formatting
D. UDP B. Updating
60. How can viruses be transferred between C. Upgrading
computers? D. none of above
A. USB pens
65. malware
B. e-mail
A. is any software created to perform ma-
C. Downloads licious acts. it includes adware, spyware,
D. All of these grayware, viruses, worms, Trojan horses,
and rootkits. Malware is usually installed
61. you received a phone call from a person on a computer without the knowledge of
who claims to represent partner services the user.
and then asks that you for confirmation
B. is a software program that displays ad-
of username and password for auditing
vertising on your computer.
purposes. Which security threat does this
phone call represent? C. is distributed without user interven-
tion or knowledge.
A. DDoS
D. a free software program may require
B. spam
the installation of a toolbar that displays
C. social engineering advertising or tracks a user’s website his-
D. anonymous keylogging tory.
NARAYAN CHANGDER
C. A type of malware that uses encryption
D. application software to lock the user out of their files then re-
quests a large sum of money to unlock and
68. DISTRIBUTED SERVER Also known as return the data.
A. *local or workgroup D. A type of malware which secretly mon-
itors and records user actions.
B. client itself
C. SysConf 73. Cathay Pacific management has been de-
ciding whether to purchase additional
D. Subnet B737 Max for their planned new routes
to South America which will start 2 years
69. WAN stands for from now . This type of decision falls un-
A. Wide Area Network der which network process.
B. World Area Network A. Network strategy
71. Your company needs to extend their pri- 75. How do you create a group by using Active
vate address space in Azure by by provid- Directory Users and Computers snap-in?
ing a direct connection to your Azure re- A. Left click the OU in Find which you want
sources. They implement which of the fol- to create a group, select New, and choose
lowing? Group.
A. User-defined route B. Right-click the OU in Find which you
B. Virtual appliance want to create a group, select New, and
choose Group.
C. Virtual network endpoint
C. This can only be done in the registry
D. none of above editor.
D. You can create a group by typing 80. Which of these is the most secure pass-
MSCONFIG in the Run box. word?
85. is a software program that displays adver- 91. Who owns and controls the internet?
tising on your computer. A. Google
A. Adware
B. Government
B. Spyware
C. Schools
C. Grayware
D. Nobody
D. Helpware
92. The process of converting plaintext to ci-
86. The more complex password, the more
NARAYAN CHANGDER
phertext.
possible there could be.
A. cryptography
A. Characters
B. cyphertext
B. Numbers
C. decryption
C. Combinations
D. none of above D. encryption
87. Which of the following is used to secure 93. What program would you use to install for
LANs Web server in Ubuntu Server?
A. Fire Blanket A. Dice
B. Firewall B. Firewire
C. Electric fence C. Apache
D. Brick Wall D. IIS
88. involves rearranging the information 94. How can you protect yourself from
on a disk so that files appear in continu- viruses?
ous sequences of clusters
A. By buying padlocks
A. Firewall
B. By keeping your software updated
B. Firmware
C. By hiding your hard drive
C. Disc clearner
D. By playing online games
D. Defragmentation
95. LAN Stands for
89. What does a firewall block?
A. Low Area Network
A. It blocks nothing
B. Local Area Network
B. Blocks all incoming connections
C. Blocks unwanted connections C. Large Area Network
90. In which process data jumbled using a key 96. A string of text that has been converted
so it cannot be understood. to a secure form using encryption.
A. Backup A. encryption
B. Cryption B. decryption
C. Encryption C. ciphertext
D. none of above D. plaintext
97. A type of attack that sends enough re- 102. When the attacker pretends to repre-
quests to overload a resource or even stop- sent a legitimate organization and asks
ping its operation. for verification of victims information such
NARAYAN CHANGDER
107. Passwords are used in many instances C. A complicated password you may for-
when accessing the internet. Which of the get.
following ensures that? D. A combination of letters, numbers &
A. accessing your email account special characters
9.2 SNMP
1. Network management via SNMP is based B. agent-administrator
on a paradigm
C. application-agent
13. When a managed device suffers or de- C. Get Request e Get-next Request
tects some type of anomaly, and it tries to
D. Inform Request e Report
alert the only network management sta-
tion about that condition, the operation 18. Check the correct option regarding the
(PDU-Protocol Data Unit) of the SNMPv2 SNMP management protocol:
protocol called
A. SNMPv2 operates as a TCP connection-
A. Trapv2
oriented application protocol, maintaining
B. Inform the authentication standards, passwords,
NARAYAN CHANGDER
C. Get Next and strong encryption of SNMPv1.
D. Report B. SNMPv1 provides advanced features
of authentication and strong encryption,
14. SNMP runs on which allows high effectiveness and secu-
A. TCP Port 161/162 rity in management, even in complex IP
B. UDP Port 161/162 networks such as the Internet.
26. Which of the following are SNMP mes- 31. UDP port number used by SNMP manager
sages? to communicate with Agents is
A. Trap: Used to report events. A. 162
NARAYAN CHANGDER
B. It has SNMP compatibility only for
monitoring Windows workstations and more security.
servers.
37. We can compare the task of network man-
C. Supports SNMP for manageable net- agement to the task of writing a program.
work devices only. Both tasks need variable declarations. In
D. It is compatible with SNMP and its network management this is handled by
Manager Agent framework.
41. The management information bases used 46. SNMP represents the management proto-
by SNMP are called: col of the TCP/IP architecture, whose op-
eration is based on a small number of man-
C. Report D. Trap
NARAYAN CHANGDER
10.1 Introduction
1. These define access permissions for a user A. Firewall
(1-3) B. Intrusion Protection System (IPS)
A. Group Permissions C. Authentication, Authorization, Ac-
B. User Access Levels counting (AAA)
C. User Maintenance D. Virtual Private Network (VPN)
D. Group and User Settings 5. What technology can you use temporarily
2. It is a malicious program that gains full ac- to connect networks from two different
cess to a computer system. Often, a direct companies?
attack on a system using a known vulner- A. VPN
ability or password. B. HTTP
A. Virus C. DHCP
B. worm D. passive router
C. Trojan
6. NSGs are used at level & /or level.
D. Rootkit
A. Perimeter, network
3. Pretend to be someone (personnel) or B. NIC, Vnet
something (process).
C. Vnet, subnet
A. Eavesdropping
D. subnet, NIC
B. Hacking
C. Impersonation 7. NAP is
D. Penetration testing A. Network Access Protocols
B. Network Access Policies
4. Which type of security device provides en-
crypted access to a network for remote C. Not to Access Protocols
users? D. Network Address Protocols
NARAYAN CHANGDER
9. HTTP protocol uses the following port: 14. What is the definition of a brute force at-
tack?
A. 53
A. Repeatedly trying usernames/passwords
B. 443 to access a system
C. 1723 B. Physically threatening someone to
D. 80 give up personal information
C. Physically breaking into a device to
10. The ‘official title’ of the person who is re-
hack it
sponsible for exploring vulnerabilities of
computer systems and reporting of this in D. Being a very strong hacker
an organisation 15. you receive an email from your bank,
A. Penetration tester telling you that your account has been com-
B. Systems administrator promised and you need to validate your ac-
count details or else your account will be
C. Network manager closed. you are supposed to click a link to
D. Forensic technician validate your information. what is this an
example of?
11. When I am shopping online:
A. a security breach at your bank that
A. I’m not thinking about security needs to be resolved
B. It depends. If I am in a hurry tI don’t B. spam
think of it
C. ransomware
C. Besides of ordinary rules of security I D. Phishing
read store regulations and customers re-
views. I pay attention about my payment 16. Matt, an administrator, notices a flood
D. none of above fragmented packet and retransmits from
an email server. After disabling the TCP
12. What is not the role of a firewall? offload setting on the NIC, Matt sees nor-
mal traffic with packets flowing in se-
A. To create a choke point
quence again. Which of the following utili-
B. To log Internet activity ties was he MOST likely using to view this
C. To monitor internal communications issue?
D. To limit network exposur A. SPAM filter
B. Protocol analyzer
13. You receive an email in your inbox from
your friend Sara. The title of the email is C. Web application firewall
“this is so cool!” and inside the email is an D. Load balancer
17. Which type of attack involves a “threat 22. in computing is a network security sys-
actor” gaining physical access to a de- tem that monitors and controls incoming
vice and using that device to capture data and outgoing network traffic based on pre-
18. What type of network can you set up that 23. A proxy firewall filters at?
is another company’s internal network? A. Physical layer
A. intranet B. Data link layer
B. extranet C. Network layer
C. internet D. Application layer
D. DMZ 24. Stream ciphers means
19. Which among these is not a common LAN A. Encrypt digits
attack? B. Encrypt letters
A. MAC Address Table Flooding Attack C. Encrypt digits or letters
B. VLAN Attack D. none of above
C. Network Attack
25. What port number is RDP (Remote Desk-
D. Telnet Attack top Protocol)?
20. Which type of attack trys different pass- A. tcp 80
words, hoping that one will work? Some B. tcp 3389
logic can be applied by trying passwords C. tcp 445
related to the person’s name, job title, hob-
bies or similar items. D. tcp 389
28. The typical port used by TCP for HTTP is 34. What is the technical term for the name
associated with a wireless network (the
A. 60 name that appears when you are scanning
for networks or the name of the network
B. 90 you are on)?
C. 80
A. MAC Address MAC)
D. 70
B. IP Address (IP)
29. A type of attack that uses a forgotten IP
NARAYAN CHANGDER
or MAC address to impersonate a trusted C. Service Set Identifier (SSID)
computer.
D. Network Address Translation (NAT)
A. Man-in-the-Middle
B. Distributed DoS (DDoS) 35. Setting user access levels means that
C. SYN Flood A. Anyone can update software to the lat-
D. Spoofing est version
30. Which of the following is the type of fire- B. Passwords must be shared with the
wall? network manager
A. Packet Filtering Firewall C. Hackers can never gain access to the
B. Dual Homed Gateway Firewall system
C. Screen Host Firewall D. Central systems are protected even if
D. All of the mentioned some users’ accounts are compromised
31. Rate the password:Harry0304 36. Which of the following actions is a copy-
A. Weak right violation?
B. Moderate A. Sharing a Website address
C. Strong
B. Reading material from a publicly avail-
D. none of above able Web site
32. What port number is SNMP (Simple Net- C. Copying software and distributing it to
work Management Protocol)? your friends
A. tcp 80 D. Quoting a paragraph and mentioning
B. tcp 161 the source
C. udp 161
37. Why do business pay people to do a pene-
D. tcp 3389
tration test?
33. Traffic can be secured over a network by
A. To see what data can be stolen
applying what?
A. Encryption B. To see where weaknesses are
B. Hashing C. To see how to prevent another attack
C. CRC in the future
D. IP addressing D. To see how they broke in
38. Which of the following is a PPP authenti- 43. It is any software designed to damage or
cation protocol that enables users to au- to disrupt a system.
thenticate using smartcards, badge read-
B. PAP D. Phishing
48. What percentage of cybersecurity 53. is a form of internet security that con-
breaches are due to human error? ceals internal addressing schemes from the
A. 50% public internet.
B. 30% A. SAT
C. 75% B. NAT
D. 95% C. WAT
49. What is the behavior of a switch as a re- D. MAT
NARAYAN CHANGDER
sult of a successful CAM table attack?
54. The addressable total number of hosts in
A. The switch will forward all received an IPv4 scheme is
frames to all other ports.
A. 4.3 million
B. The switch interfaces will transition to
the error-disabled state. B. 4.7 billion
C. The switch will drop all received C. 4.3 billion
frames.
D. 4.7 million
D. The switch will shut down.
55. Which of the following operating systems
50. Which type was the first generation of
are susceptible to viruses?
firewalls?
A. windows
A. Next-generation firewall (NGFW)
B. Packet filter B. windows, and mac OS X
D. Ransomware B. NIPS
E. Spyware (Key Logger) C. Internet content filter
58. The network security engineer just de- B. Access to files is limited
ployed an IDS on the network, but the C. No access to file system
Chief Technical Officer (CTO) has concerns
NARAYAN CHANGDER
traffic patterns. Which of the following
C. Malicious software that it usually at-
would BEST describe the security control
tached to an email and sends itself around
used at the warehouse?
a network to allow unauthorised access to
A. Preventive your system
B. Compensating D. Malicious software that sets your com-
C. Physical puter on fire
D. Detective 73. When computer virus starts to impact
data, it is known as
69. A(n) level proxy provides protection
at the session layer of OSI. A. virus infection
87. What option can you configure on your 91. A method used to prevent physical access
workstation to increase security when you to the system
leave your desk? A. Encryption
A. file encryption B. Intruder Alarm
B. multi factor authentication C. Firewall
C. single sign-on D. Anti-Malware
D. screensaver password 92. What kind of threat is described when a
NARAYAN CHANGDER
threat actor impersonates another person
88. means the protection of data from to obtain credit information about that per-
modification by unknown users. son?
A. Confidentiality A. Data loss or manipulation
B. Integrity B. Disruption of service
C. Authentication C. Identity theft
D. Non-repudiation D. Information theft
89. Which of the following statements best de- 93. Ensuring appropriate network means
fines out-of-band management? preventing attackers from altering the ca-
pabilities or operation of the network.
A. Out-of-band management is a method
for accessing network devices from a re- A. confidentiality
mote location. B. integrity
B. Out-of-band management is a method C. availability
for accessing network devices using a di- D. functionality
rect cable connection.
94. are compromised hosts running mal-
C. Out-of-band management is a method ware controlled by the hacker.
for accessing network devices using a
connection to the system other than the A. DDoS
production network to which the device is B. ICMP
connected. C. Bots
D. Out-of-band management is a method D. None of the above
for accessing network devices using any
tool that operates over the production net- 95. It uses available resources, such as pass-
work to which the device is connected. words or scripts.
A. Accidental Threats
90. Organisation can protect themselves from
SQL injection attacks by downloading and B. Malicious Threats
installing [7-9] C. Structured Attacks
A. Patches D. Unstructured Attacks
B. Software 96. TCP is:
C. Upgrades A. Transmission Control Protocol
D. Downgrades B. Transmission Count Protocol
106. HTTPS is a type of protocol. What does unauthorized access and that access to the
“S” stands for IT systems should be logged. Which of the
A. Safe following would BEST meet the CISO’s re-
quirements?
B. Secure
A. Sniffers
C. Standup
B. NIDS
D. Safety
C. Firewalls
NARAYAN CHANGDER
107. The typical port used by TCP for Secure
Shell is D. Layer 2 Switches
116. Data travels across networks in 121. If you receive an email claiming to be your
A. Nibbles bank or another organisation and you are
asked for security details. What type of
NARAYAN CHANGDER
vent which type of security attack?
A. proxy server
A. Brute force attacks
B. application firewall
B. Users sharing passwords
C. NAT filtering
C. Social engineering
D. Passwords being reused immediately D. circuit-level gateway
128. HTML stands for 133. How can a brute-force attack be de-
layed?
A. Hypertext Markup Language
A. Using CAPTCHA
B. Hypertext Markup Language
C. Hypertext Modulator Language B. ISPs rejects access to attackers
136. controls traffic by defining zones such C. Users on a network from installing
as DMZs (demilitarized zones), the inter- software.
nal network, and perimeter networks.
NARAYAN CHANGDER
B. Malicious code that spreads from de-
C. Enables remote users outside the net-
vice to device but does not need to attach
work to access network workstations
itself to a program in order to do so
D. Enables remote users to access work-
stations without the need for a Remote C. A program that pretends to be safe,
Desktop client. while actually containing malicious code
D. software that installs itself onto de-
146. You are trying to find the IP address of
vices and then steals personal informa-
the web server of the company you want
tion about the user, like passwords,
to attack. This is?
A. Forensics 151. Which of the following network design
B. Diagnosis elements allows for many internal devices
to share one public IP address?
C. Scanning
D. Attack A. DNAT
B. PAT
147. The unauthorized real-time interception
of a private communication. C. DNS
A. Eavesdropping D. DMZ
B. Hacking
C. Impersonation 152. Which firewall examines packets in isola-
tion and does not know the packet’s con-
D. Penetration testing text?
148. Which of the following can be used to pro- A. Packet Filtering
tect a network?
B. Stateful
A. Firewall
C. Stateless
B. Blocker
C. Server D. Proxy
154. Which type of computer is 100% virus- 159. They are windows that automatically
proof? open and are designed to capture your at-
tention and lead you to advertising sites.
NARAYAN CHANGDER
D. Trojan horse 170. When logging into an online account,
165. A network-attached system set up as a what should you check for?
decoy to lure cyberattackers and to detect, A. https
deflect or study hacking attempts in order B. The web address
to gain unauthorized access to information
systems. C. The images represent the company
A. intrusion detection system D. The text on the screen
B. Fly trap E. How long you have left to fill the details
in
C. Honeypot
D. Intruder alarm server 171. Which of the following is not an access
control method
166. refers to software that controls net-
work traffic and access to network re- A. Access Control List
sources. B. Capability list
A. Protocol C. Role based
B. Network operating system D. User discretion
C. Network Adapter
172. A security administrator is reviewing a
D. Media report that shows a number of devices on
167. The default behaviour of anti-malware internal networks attempting to connect
software if it detects a virus with servers in the data center network.
Which of the following security controls
A. Quarantine the suspicious file should the administrator add to prevent in-
B. Delete the suspicious file ternal systems from accessing data center
C. Shut down the computer devices?
178. refers to software that controls net- B. To examine the data packets at a cer-
work communications using a set of rules. tain IP address
A. Media C. To copy the data packets and analyse
B. Device them
C. Protocol D. It is not legitimate to use packet sniff-
D. Network Adapter ing software
NARAYAN CHANGDER
C. They help understands security and its
sonal data into a system and copying what
components better
you see.
D. They help to understand the cyber-
crime better 188. A method for determining a solution to a
problem by sequentially testing all possi-
184. What is Network Security Threats? ble solutions.
A. The threat that occurs when thieves A. brute force
steal our device B. relative frequency
B. The threat that occurs when you have C. cipher
network issue in online class D. paired keys
C. A threat that occurs to anything that
189. What is Phishing?
has the potential to cause serious harm
to a computer system A. The attempt to acquire sensitive info
such as usernames, passwords and credit
D. Just a threat card details
185. What can virus affect? B. Going for fishing
A. Keyboard C. It is an attack in which a hacker at-
tempts to redirect a website’s traffic to an-
B. Hard drive
other fake bogus website.
C. RAM D. none of above
D. All of the above
190. These define access permissions for a
186. Ensuring network means that autho- user
rized users have access to information, A. Group permissions
services, and network resources. B. User Access levels
A. confidentiality C. User Maintenance
B. integrity D. Group and user settings
C. availability 191. If someone hacks into your email, which
D. authentication law have they broken?
A. The Data Protection Act
187. Which of these is the best definition of
Blagging? B. Regulation of Investigatory Powers
Act
A. Calling someone to create an invented
situation that increases the chance they C. Computer Misuse Act
will share sensitive information with you. D. Freedom of information Act
192. The full form of OSI is OSI model is management are true? (Choose all that
A. Open Systems Interconnection apply.)
NARAYAN CHANGDER
B. Data theft D. Spoofing
C. Virus 207. Encrypts all files on the device. The at-
D. Phishing tacker demands large sums of money to
decrypt the files.
203. What type of firewall do you use to block A. Scareware
access to certain websites or instant mes-
sengers? B. Ransomware
A. Internet content filter C. Spyware
B. NIDS D. Trojan
211. Which of the following is not a social en- 216. are considered the “traffic cops” for
gineering technique? the flow of information inside and out-
side of the network, and to accomplish
D. Pharming A. Routers
B. Hubs
212. When is a penetration test done?
C. Gateways
A. Before an attack D. Switches
B. After an attack
217. What port number is HTTPS (Hyptertext
C. During an attack Transfer Protocol Secure)?
D. Never A. tcp 161
B. tcp 80
213. What four components are required for
a computer to establish a remote Trans- C. tcp 22
mission Control Protocol/Internet Proto- D. tcp 443
col (TCP/IP) connection?
218. refers to any piece of hardware such
A. Common protocols
as a computer, server, printer, or smart-
B. Remote Access Service (RAS) phone.
C. A physical layer connection A. Protocol
D. TCP/IP configuration B. Media
E. Host and remote software C. Network Adapter
D. Device
214. What does the data get broken down in
to allowing it to travel across a network 219. It is a software program that displays
such as the internet? advertising on your computer, often dis-
played in a pop-up window.
A. Packets
A. Malicious software (malware)
B. Pieces
B. Adware
C. Parts
C. Spyware
D. Points
D. Phishing
215. Remote Desktop Protocol (RDP) was cre- 220. Which one of these is a characteristic of
ated for use with which of the following a good security policy-2 answers
terminal emulation programs?
A. The policy must be enforceable
A. Windows Terminal Services
B. The policy must be strict
B. Virtual Network Computing (VNC)
C. The policy must be written in several
C. Citrix WinFrame languages
D. Telnet D. The policy must be voluntary
NARAYAN CHANGDER
D. A malicious software tual Private Network (VPN) connections?
(Choose all that apply.)
222. Which of the following prevents Denial of
Service attacks? A. TLS/SSL client
A. Providing user access levels B. TLS/SSL portal
B. Encryption C. TLS/SSL tunnel
C. Authentication D. TLS/SSL gateway
D. Firewall
228. are an additional layer of compro-
223. is the process of obscuring an attack- mised hosts that are used to manage large
ers source IP address. groups of bots.
A. Backscatter
A. Botnets
B. Spoofing
B. Handlers
C. IP Flood
C. Phatbots
D. None of the above
D. None of the above
224. Which one of the following is a key func-
tion of a firewall? 229. The flow of traffic is from a user’s client
A. Monitoring computer, to a , to a , and then out
B. Deleting to the Internet or to a local data center to
access the services needed.
C. Copying
A. switch, router
D. Moving
B. router, gateway
225. Cipher based on substitution, using multi-
ple substitution alphabets is called: C. router, switch
A. Polyalphabetic cipher D. switch, hub
B. Monoalphabetic cipher
230. To destroy software media (floppy disks
C. Polycipher and CDs) we use:
D. Monocipher
A. Antivirus
226. Khalid opens his fitness tracking app to B. A shredding machine
start logging a workout. The app crashes,
and he is unable to log his workout. C. Hard Drive Recycling
A. C D. Security policy
231. What do business get after a penetration 235. Which of the following protocols can be
test? exploited to DoS
240. What port number is Telnet (Telecommu- 245. The is the largest WAN in the world.
nications Network)? A. Intranet
A. tcp 21
B. Internet
B. tcp 22
C. PPTP
C. tcp 23
D. NAT
D. tcp 445
246. A tool that eliminates the magnetic field
NARAYAN CHANGDER
241. An IDS which uses machine learning mod- on a hard drive that allow for the storage
els to learn from past experience is of data.
A. Heuristic A. Degaussing Tool
B. Anomaly B. Shatter Tool
C. Signature C. Shredding machine
D. Rule Based D. Wiping Tool
242. is a feature in Internet Explorer that
247. A stateful firewall maintains a , which
helps detect phishing websites. It can also
is a list of active connections.
helps protect you from downloading or in-
stalling malware (malicious software). A. Routing table
A. Java & active control X B. Bridging table
B. Antivirus C. State table
C. Ad-block D. Connection table
D. smart screen filter 248. A system that monitors traffic into and
243. When someone sent e-mail, link or at- out of a network and automatically alerts
tachment, I’m opening him: personnel when suspicious traffic patterns
occur, indicating a possible unauthorized
A. always and from everyone intrusion attempt is called a(n)
B. sometimes, but not always I think it’s A. IDS
safe
B. Firewall
C. only when he sends it familiar and
looks reliably (e.g. topicindicates that it C. Router
is really to me) D. Anit-virus software
D. none of above
249. A malware program that, when executed,
244. Which of the following was the first replicates by inserting copies of itself (pos-
Transmission Control Protocol/Internet sibly modified) into other computer pro-
Protocol (TCP/IP) terminal emulation pro- grams, data files, or firmware is known
gram? as?
A. Telnet A. Malware
B. SSH B. Virus
C. Windows Terminal Services C. Spoofing
D. Virtual Network Computing D. none of above
250. Under which law can law enforcement C. Help.I am stuck aboard and urgently
agencies intercept personal communica- need money transferred to me to get
tions? home.
C. Password B. Bathing
D. qwerty C. Malware
NARAYAN CHANGDER
C. decryption B. Adware
D. computer security C. Spyware
D. Phishing
261. How many bits is the effective length of
the key used in the Message Digest five 266. When I log in to public place on one of my
(MD5) algorithm? accounts I pay attention to safeconnection
A. 168 (e.g. https, whether the certificate is safe)
and If nobody is not looking for keyboard:
B. 128
A. Sometimes
C. 56
B. Never
D. 64
C. Always
262. What most defines a computer virus?
D. none of above
A. It crashes computers
267. Someone monitors the data travelling on
B. It can copy itself and spread to other
a network and intercepts sensitive info.
computers
They use packet sniffing software to do
C. It can spy on what you do this. Encryption can prevent this.
D. It cannot be fixed A. PASSIVE
263. What are worms? B. ACTIVE
A. Self replicating viruses C. INSIDER
B. Earthworms in the soil D. BRUTE FORCE
C. World Register of Marine Species 268. SMTP protocol uses the following port:
D. none of above A. 25
270. According to the CIA Triad, which of the D. Allow everything except what I block
below-mentioned element is not consid-
ered in the triad? 275. Number of times the Kerberos Key Distri-
NARAYAN CHANGDER
A. composition
from SQL injection attacks by B. utilization
A. Using a firewall
C. organization
B. Only using wired connections
D. virtualization
C. Sanitising inputs
D. Hiring security guards 286. At which layer do network cables func-
tion at?
282. Which one of these is false? A. Physical
A. Availability enables authorized users-
B. Data-Link
persons or computer systems-to access
information without interferences or ob- C. Network
stuction D. Application
B. Accuracy means that information is
free from mistakes or errors that the end 287. What is the term for hacking a phone sys-
user expects it to have tem?
290. is a system that isolates internal net- 295. When you use the word it means you
works from the internet by downloading are protecting your data from getting dis-
and storing internet files on behalf of in- closed.
A. Phishing B. 21
B. Denial of Service C. 53
C. Root kit D. 56
D. Worms 297. Which of the following is an example of
a symmetrical algorithm?
292. of information means, only autho-
rised users are capable of accessing the in- A. RSA
formation. B. DSA
A. Confidentiality C. ECC
B. Integrity D. 3DES
C. Non-repudiation
298. Which of the following is NOT a malicious
D. Availability
SQL statement?
293. What type of self-replicating program A. SELECT * FROM table users
copies to other computers on a network WHERE user id= 1
without any user intervention and con-
B. SELECT * FROM table users
sumes bandwith and computer resources?
WHERE user id= 16 OR 1=1
A. Virus
C. SELECT * FROM table users
B. Trojan Horse WHERE user id= 15 AND user
C. Worm id=10
300. The company that you work for wants 305. A secure way to transfer file to a remote
to set up a secure network, but they do server is by using
not have any servers. Which three secu- A. FTP over SSH
rity methods require the use of a server?
(Choose three.) B. FTP
A. 802.1x C. FTPS
NARAYAN CHANGDER
C. WPA2 Enterprise 306. What is the core of an OS called?
D. RADIUS A. Shell
E. 802.11ac B. User
C. Kernel
301. Which of the following firewall types in-
spects Ethernet traffic at the MOST levels D. Commands
of the OSI model?
307. Which of the following is the most accu-
A. Packet Filter Firewall rate definition of a Trojan?
B. Stateful Firewall A. A stand-alone program that replicates,
C. Proxy Firewall doing damage to a system
D. Application Firewall B. Malicious code that spreads from de-
vice to device but does not need to attach
302. What port number is DNS (Domain Name itself to a program in order to do so
System)? C. A program that pretends to be safe,
A. udp/tcp 53 while actually containing malicious code
B. tcp 21 D. software that installs itself onto de-
C. udp 21 vices and then steals personal informa-
tion about the user, like passwords,
D. udp/tcp 427
308. What is chipper text
303. Events or attacks that remove, corrupt,
A. Encryption data
deny access to, allow access to, or steal
information. B. Encrypted data
A. Malicious Threats C. Data Decrypt
B. Accidental Threats D. none of above
C. Data Security Attacks 309. You are unable to log on to your e-
D. Physical Security Attacks mail account. You realize that someone
has changed the password without your
304. The shift cipher is sometimes referred to knowledge. Which one of the following
as the terms describes this activity?
A. Caesar cipher A. Online predating
B. Shift cipher B. Theft
C. cipher C. Internet scam
D. cipher text D. Spyware
310. A way of protecting a computer from in- 315. Which of the following types of traffic
trusion through the ports are carried by the Remote Desktop Proto-
col (RDP)? (Choose all that apply.)
320. Which one is an example of ‘physical se- 325. What type of attack tries to guess pass-
curity’? words by every combination of charac-
A. firewall ters?
NARAYAN CHANGDER
321. How can a network administrator make
an SSID harder to find? 326. All firewalls contain this feature
A. Encrypt the SSID A. Packet filtering
D. Never use remember password and 335. Secretly monitors users actions (e.g. but-
keep complex passwords you can remem- tons pressed)-info is sent on to a hacker.
ber
333. Which of the following are examples of 338. Which of these is an indicator that the
out-of-band device management? (Choose website is secure.
all that apply.) A. Bruce Lee photo
A. Logging on remotely from a network B. The http://
workstation
C. The https://
B. Plugging a laptop into a console port
D. The https:
C. Establishing a point-to-point modem
connection
D. Connecting dedicated ports on each 339. Which network security device grants ac-
device to a separate switch cess to a network, determines what ac-
tions they can perform, and logs activi-
334. The is a number or a set of numbers ties?
on which the cipher operates. A. Firewall
A. secret B. Virtual Private Network (VPN)
B. cipher C. Intrusion Prevention System (IPS)
C. key D. Authorization, Authentication, Ac-
D. none of the mentioned counting (AAA)
340. Many managed switches and routers in- 344. helps to manage the security of Vir-
clude a console port for administrative ac- tual Machines by grouping them according
cess, to which you can connect a laptop and the applications that runs on them.
run a terminal program to access the de- A. Network Security Groups
vice’s interface. Which of the following is
the best term for this type of access to the B. Service end points
device? C. Private end points
A. Out-of-band D. Application Security Groups
NARAYAN CHANGDER
B. In-band 345. What is the function of a firewall?
C. Client-to-site A. Filters email that is sent by attacker
D. BYOD B. Prevents malware and hackers from
accessing a system
341. When the data transmissions are inter-
cepted and recorded by an attacker, then C. Blocks unauthorised access in to and
replayed to gain access. This attack is out of a network
called: D. All of the above
A. Man-in-the-Middle 346. Malware
B. Replay A. Are different types of threats to com-
C. SYN Flood puter systems.
D. Spoofing B. Is a manufacturer of computer parts
C. Hard to find on the internet
342. The network security executive has been
given the additional duty of testing the D. Distribution is completely legal.
servers. Which principle does this dis- 347. A computer monitoring packets entering
obey? and leaving a local area network
A. Separation of Duties A. firewall
B. Least Privileges B. virus
C. Single Sign On C. worms
D. Economy D. none of above
343. How many of the following methods 348. The FOUR organizational goals of an in-
could be used to distribute a virus? formation security program
(choose as many as you think are appro- A. Protect the functionality of the organi-
priate) zation
A. Via an attachment sent in an on- B. Enable the safe operation of applica-
line/instant message tions
B. Through files on a memory stick / CD C. Protecting the data collected and used
C. Through a link in an email D. Authenticating the users accessing
D. Through a program downloaded from data
the internet E. Safeguarding technology assets
349. An enhanced encryption protocol combin- 353. A subject’s ability to use, manipulate, or
ing a 104-bit key and a 24-bit initializa- modify and affect another subject or obect
tion vector
NARAYAN CHANGDER
for possible vulnerabilities is called
359. AES stands for
A. Penetration testing
A. Advanced Encryption Standard
B. Network forensics
B. Additional Entry Services
C. Network policies
C. Adopted Enhanced Server
D. Encryption
D. none of above
365. Sending requests to a single server using
360. The DHCP snooping configuration does hijacked machines is called
not include building the DHCP Snooping
Binding Database. A. Phishin
A. True B. DDOS
B. False C. Worm
369. The term ‘intranet’ comes from the C. a lock that can be used to lock a mes-
phrase sage in a lock box
379. Which of the following security threats data packet for protection. Split tunnel-
includes suspicious activity, such as re- ing is a variation of this method that pro-
viewing someone’s screen display without vides which of the following advantages?
permission? (Choose all that apply.)
A. Malware A. Conservation of VPN bandwidth
B. Shoulder surfing B. Access to local network devices while
C. Phishing connected to the VPN
NARAYAN CHANGDER
D. Password cracking C. Additional data integrity protection
D. Faster data transmission through mul-
380. Physical security: tiplexing
A. The protection of the physical items
or areas of an organization from unautho- 384. Which of the following is the most accu-
rized access and misuse rate definition of a virus?
386. Which types of firewalls can block a con- 391. In intrusion detection system vernacular,
nection based on application type? which account is responsible for setting the
security policy for an organization?
389. What protocol is used with L2TP to pro- 394. An attacker controlling bots in a coordi-
vide encryption? nated attack against a victim is known as
a
A. IPSec
B. MPPE A. DoS attack
B. HIDS B. ZOMEBO
C. HIPS C. ZFMEBO
D. NIDS D. ZFMEBA
396. In regards to network security, 401. An attack has happened. What should
means preventing unauthorized users you do?
from gaining information about the net-
A. Pay for network forensics
work structure, data flowing across the
network, network protocols used, or B. Prevent it from happening by doing a
packet header values. penetration test
A. confidentiality C. Panic and tell you mam and dad
B. integrity D. Ring parents to let them know that
NARAYAN CHANGDER
C. availability data has been stolen
D. authentication 402. Asymmetric key is
397. What are cons of using a signature-based A. Sender use one key
malware detection versus heuristic? (se-
B. Receiver use same key
lect all that apply)
C. Both use different key
A. Many attacks do not conform to spe-
cific signatures D. none of above
B. Signatures require more system re-
403. What does an EULA do
sources than heuristic learning
C. There are more false positives A. Specifies the terms on how we can use
software
D. Signatures must be updated often
B. Forces us to buy software from partic-
398. which of the following are consider phys- ular vendors
ical security risks?
C. Explains what bugs might be in the pro-
A. Hardware theft gram
B. password cracking D. Explains who we need to contact if we
C. phishing have a problem
D. cooking 404. Which of these is the best definition of
399. Name all the computer viruses Pharming?
A. Trojan horse A. Calling someone to create an invented
situation that increases the chance they
B. logic bomb
will share sensitive information with you.
C. McAfee
B. Sending an email that pretends to be
D. redlof from a reputable company which usually
has a link to click that takes you to a web-
400. Worms
site that looks real but is not.
A. Do not need to attach to a program
C. A cyber attack that redirects a user
B. Need to attach to a program from a real URL to a website that looks
C. A type of social engineering real but is not.
D. Designed to access a computer by mis- D. Looking at someone entering their per-
leading users of its’ intent by prompting to sonal data into a system and copying what
download a program you see.
405. An example of is not revealing the type C. To find out card details
of computer, operating system, software, D. All of the above
and network connection a computer uses.
C. Diversity B. Control
D. Layering C. Availability
D. Non-reputation
406. Events or attacks that steal, damage, or
destroy equipments. E. Integrity
A. Ensures that only safe websites are 412. What type of device is used to detect ma-
visited. licious network activities and reports only
B. Access to certain websites are those issues to the administrator?
blocked. A. NIDS
C. Hides the IP address of user B. NIPS
D. All of the above C. Internet content filter
415. Packet filters, circuit-level gateways, 420. Which of these rules is NOT a good guide-
and application-level gateways are all line for managing passwords?
types of A. Do not use a previous password
A. Proxy servers B. Do not use a password with identifi-
B. Firewalls able items (such as phone number)
C. Tokens C. Make the password as long as possi-
ble
D. Application layers
NARAYAN CHANGDER
D. Ensure that it includes a mix of charac-
416. Which of the following is a best practice ter types
when securing a switch from physical ac-
421. What method of network security uses
cess?
passwords, user names and authentica-
A. Disable unnecessary accounts tion?
B. Print baseline configurations A. Access Control
C. Enable access lists B. Firewall
D. Disable unused ports C. Physical Security
D. Anti-Malware
417. A set of instructions secretly incorpo-
rated into a program so that if a particular 422. A virus has been detected on a device con-
condition is satisfied they will be carried nected to a network. What SHOULD be
out, usually with harmful effects. done first?
A. Trojan Horse A. Run a virus scan on all shared areas
B. Logic Bomb B. Disconnect the device from the net-
C. Birthday Attack work
C. Contact the user to let them know what
D. Worm
has happened
418. What device is used to protect one net- D. Update the anti-virus software
work from another by using filtering pack-
ets? 423. The weakest point in a security system,
is usually:
A. DMZ
A. Poorly coded software
B. firewall
B. People
C. proxy server
C. Unreliable hardware
D. layers
D. Poor network connections
419. Type of malware that hides within or 424. Which of the following devices would de-
looks like a legitimate program and does tect but not react to suspicious behavior on
not replicate itself. the network?
A. virus A. NIPS
B. trojan horse B. Firewall
C. rootkit C. NIDS
D. worm D. HIDS
429. A technician is deploying virtual machines 434. An active directory setting restricts
for multiple customers on a single physi- querying to only secure connections.
cal host to reduce power consumption in a Which of the following ports should be
data center. Which of the following should selected to establish a successful connec-
be recommended to isolate the VMs from tion?
one another? A. 389
NARAYAN CHANGDER
B. Anti malware software our ability to read and save
C. Packet sniffing D. none of above
D. Network Policies 441. Whats the strongest password
436. It helps keep data and equipment safe by A. bunnies123
giving only the appropriate people access. B. dave23
A. network security C. SGFY12? ? !
B. firewall D. starcube
C. antivirus 442. Which of the following statements is
D. security threats FALSE?
437. What can we use to protect our computer A. TLS is a successor of SSL.
from hackers B. TLS uses two layers of protocols.
A. fire wall C. SSL requires additional computer time
B. a picture which says “stay away” when compared to TLS.
445. Which of these is the best definition of 449. Uses a number of computers over a net-
Shoulder Surfing? work of infected machines which send req
uests to a website which would bring it
453. DoS attacks can cause harm by to dial through a local ISP to connect to
the company server using L2TP and IPsec.
A. stopping a critical service
B. slowly degrading services over a pe- 455. Which of these is the best definition of
riod of time Phishing?
C. Both A and B A. Calling someone to create an invented
situation that increases the chance they
D. Neither A nor B will share sensitive information with you.
NARAYAN CHANGDER
454. Your company has two users who want B. Sending an email that pretends to be
to telecommute from home. They do not from a reputable company which usually
have any hardware or software config- has a link to click that takes you to a web-
ured or installed. They need to transfer site that looks real but is not.
files to the corporate network over a se- C. A cyber attack that redirects a user
cure link. Your company has a Virtual from a real URL to a website that looks
Private Network (VPN) concentrator that real but is not.
uses Layer 2 Tunneling Protocol (L2TP) and
Internet Protocol Security (IPSec). The D. Looking at someone entering their per-
users want to implement the fastest avail- sonal data into a system and copying what
able service. Both of the users’ homes you see.
are within 10, 000 feet of a central office.
456. Which firewall generation can you config-
Which of the following solutions address
ure to allow a user to connect to Facebook,
this scenario? (Choose all that apply.)
but not watch videos from that site?
A. Each user should install a modem and A. Next-generation firewall (NGFW)
VPN client software, and configure it
to dial through a local Internet Service B. Stateful firewall
Provider (ISP) to connect to the company C. Dynamic packet firewall
server using L2TP and IPSec.
D. Packet filter firewall
B. Each user should establish a Digital
Subscriber Line (DSL) connection by either 457. How can a network administrator restrict
ordering a new line or using the existing which devices are allowed onto a wifi net-
line. Each user then needs to install VPN work to only a specified list of devices?
client software and configure it to con- A. IP spoofing
nect to the company server using L2TP
and IPsec. B. MAC address filtering
NARAYAN CHANGDER
wall?
B. Cryptography
A. Intrusion detection or prevention
C. Staganography
B. Packet filtering
D. Watermarking
C. Access control
D. All of the above 475. Which DMZ configuration uses one fire-
wall with three interfaces?
470. Identifies and exploits vulnerabilities in a
A. back-to-back configuration
system.
A. Vulnerability testing B. three-leg perimeter configuration
489. Pete, the system administrator, wishes D. Will often create a botnet to increase
to monitor and limit users’ access to ex- the amount of traffic being created
ternal websites. Which of the following E. Will allow you to steal someone’s web-
would BEST address this? site and use it for yourself
A. Block all traffic in port 80
494. Self replicate without any user help
B. Implement IDS meaning they can spread very quickly.
C. User server load balancers A. Virus
NARAYAN CHANGDER
D. Install a proxy server
B. Worm
490. What server can be used to install Win- C. Trojan
dows updates for your organization?
D. none of above
A. SCOM
495. Complete this sentence:A malware that
B. WSUS
deactivates an anti-virus software is
C. IIS
A. Spyware
D. WDS
B. Rootkits
491. What type of malware can record the C. Trojan horses
keys that you type at the keyboard and
sends them to a 3rd party? D. Back door
500. Which type of attack involves an ad- 505. What stage is the World Wide Web in?
versary attempting to gather information
A. 1.0
about a network to identify vulnerabili-
ties? B. 1.1
A. Reconnaissance attack C. 2.0
B. Man-In-the-middle attack D. 3.0
C. Eavesdropping attack 506. Tick all examples of Monoaplhabetic Ci-
D. Routing attack phers:
A. Caesar Cipher
501. If the same key is used to encrypt and
decrypt a message, this is known as? B. Vigenere Cipher
A. Symmetric encryption C. Keypad Cipher
B. Encryption doesn’t exist! D. Morse Code Cipher
C. Asymmetric encryption 507. Question 22:A user gaining access to a
D. Same-key encryption system or intercepting user data with-
out permission would be breaching which
502. Encrypt “attack” with “fall” using Play- law?
fair Cipher
A. Data Protection Act
A. BRRBER
B. Regulation of Investigatory Powers
B. BERBFP Act (RIPA)
C. BRFFFP C. Investigatory Powers Act
D. BRRBFP D. Computer Misuse Act
503. When I log in one of the mine accounts by 508. What is the full for of DoS?
public computer:
A. Distribution of Services
A. before leaving I log out my computer
from all accounts, that nobody would see B. Dangers of Safety
my data, and steal my website identity C. Disk Operating System
B. I’m just leaving D. Denial of Service
NARAYAN CHANGDER
510. architecture uses a limited set of
internet holding servers known as the A. Stateful
“root” domain servers, which now house
B. Stateless
“.com”, “.org”, “.gov”, and so on.
C. Honeypot
A. Hosting
B. IPv6 address D. Fly trap
C. Domain name service 516. What type of server would you install
D. MAC address that would be used to trap a hacker?
A. honeypot
511. These are are created with malicious in-
tent and sent by attackers B. NAT
A. Trojan Horse C. IPS
B. Worm D. IDS
C. Virus 517. When an IP addresses is combined with
D. none of above TCP/UDP ports, the union is called a
A. packet
512. What type of configuration creates a
DMZ between two firewalls? B. protocol
A. three-leg perimeter C. socket
B. basic D. message
C. back to back 518. Who was the first know user of the Cae-
D. perimeter sar Cipher?
520. Which of the following is not an advan- 525. What type of malware can record the
tage of the Virtual Network Computing keys you press?
(VNC) terminal emulation product over its
B. False C. DNAT
D. NAC
C. Minsan True
D. Kadalasan False 528. What is the standard or basic collection
of NTFS permissions?
523. What is a D.O.S A. Read and execute, read, write, full con-
A. Denial of service trol, modify, list folder contents
B. Delay of service B. Change permissions, read permis-
C. Downing of service sions, write permissions
NARAYAN CHANGDER
A. Diffie-Hellman Key Exchange
C. Application
B. Advanced Encryption Standard (AES)
D. Presentation
C. Secure Hashing Algorithm (SHA)
531. Who is responsible for providing differ-
D. RSA
ent user access levels to an organisation’s
network?
536. Which network security device monitors
A. Network manager network traffic looking fro malware and
B. Firewall network attacks.
C. General users A. Virtual Private Network (VPN)
D. none of above B. Firewall
532. Social engineering, phishing and worms C. Intrusion Prevention System (IPS)
are examples of
D. Authentication, Authorization, Ac-
A. Viruses counting
B. Scams
C. Data Interception 537. Which trait is not characteristics of a next
generation firewall (NGFW)?
D. Malware
A. Can segment a network based on user,
533. Hashing functions like MD5 and SHA are device, and application type
used in IPSEC to provide which of the fol-
lowing services: B. Delivers high-performance inspection
534. A attack is when a victim is flooded B. Allow all except specified hosts
with ICMP packets that appear to be nor- C. Allow access to only specified destina-
mal supervisory traffic tion servers
A. SYN flood D. Deny access to all destinations except
B. Ping flood specified servers
539. Which of these firewalls is used to for- B. It can spread without a user doing any-
ward each session that an internal user thing
makes to a network resource on the public
NARAYAN CHANGDER
[7-9]
B. Hacking
A. Full access to the target computer.
C. Impersonation
B. Network access to the computer only.
D. Penetration testing
C. Ability to edit all files.
D. Attackers can access the database 555. Allows a system administrator to set up
only and manipulate data. a hierarchy of users
A. Firewall
550. Before you deploy Network Access Pro-
tection (NAP), you must install: B. Network forensics
A. Internet Information Server (IIS) C. User access levels
B. Network Policy Server (NPS) D. Passwords
C. Active Directory Federation Services 556. What should you do with a found pen
D. Windows Update Service drive
A. Look at the contents to see if you can
551. Your password is 1Vu*cI!8sT.Which at- find out who the owner is
tack method is your password vulnerable
B. Look at the contents so that you can
to?
perform a cyber attack
A. Rainbow table
C. Nothing
B. Brute force
D. Hand it to the police
C. Spidering
E. Use it on a computer that isn’t your
D. Dictionary own
552. Which of the following options should 557. What information will be seen in mine
you use to verify that a Web site is secure profiles by my social media friends and
for online transactions? what will see strangers?
A. Locked padlock icon A. I set up various accesses for different
B. Encryption tool groups offriends, they will see each other
differently, strangers see only name and
C. Automatic updates icon photo
D. Internet Service provider (ISP) logo B. everybody sees everything (e.g. email,
553. refers to the network command for telephone, address, all my photos)
how to format the conversation between C. some data (like email, phone, address,
two devices. pictures) is visiblefor strangers
A. Addressing D. none of above
558. This Malware tricks the user into in- 563. The security professional’s interest in
stalling it by pretending to be useful. lies in defining the points that allow access
for investigation, interruption, and attacks
568. Which of the following would help pre- C. differently, sometimes I accept-
vent unauthorised users from accessing strangers, but then I verify them
the network, files or software? D. none of above
A. Passwords and user access levels
573. What port number is Internet Message
B. Firewall and anti malware software
Access Protocol ver. 4 (IMAP4)?
C. Firewall
A. tcp 143
D. Encryption
NARAYAN CHANGDER
B. tcp 21
569. What is the function of network policies C. tcp 443
in an organisation?
D. tcp 389
A. Authenticates users.
B. Forms an agreement between organ- 574. Which of these is the most secure wifi
isation and user regarding network’s us- username?
age. A. HiWiFi
C. Defines the configuration of browsers. B. HelloWiFi
D. Establishes a plan to recover from se- C. WiFi
curity failure.
D. Doesn’t matter
E. All of the above
575. Which device is NOT involved in the
570. You deployed a web proxy that enables 802.1X authentication process?
client computers on the LAN to connect to
websites and secure websites on the Inter- A. The Supplicant
net.What type of proxy is this? B. The Authenicator
A. Reverse C. The Authentication Server
B. Non-transparent D. The Supplicant Server
C. Forward
576. What type of malware can copy itself and
D. Routing spread itself without human interaction.
571. A program that is designed to detect, dis- A. Virus
able, and remove viruses, worms, and Tro- B. Trojan
jan horses before they infect a computer.
C. Worm
A. A Rootkit
D. Ransomware
B. Anti-virus software
E. Spyware (Key Logger)
C. ActiveX
D. Adobe Flash 577. Malware
A. Are different types of threats to com-
572. To the friends in social networks I invite:
puter systems
A. anyone who asks even if I know noth-
B. Is a manufacturer of computer parts
ing about him
B. only friends, or recently met people- C. Are hard to find on the internet
who are friends of my friends D. Distribution is completely legal
578. Typically, what level of access would a 583. I’m using the antivirus program with cur-
student in a school have on the network? rent database, and anti-advertising pro-
gram to browser:
587. Sending requests to a single server using 589. When do you need to use anti-virus soft-
hijacked machines ware.
A. Phishing A. When you are sick.
B. DoS B. When you are a doctor and give ap-
C. Worms pointments
NARAYAN CHANGDER
588. is a connection of LANs via telecom- connections to protect your devices.
munication company-owned data links,
which may consist of lease lines such as 590. Scares the user into thinking they have
copper phone lines, fiber, or leased metro- lots of viruses. Provides a malicious link
Ethernet networks. to ‘fix the problem’
A. MAN A. Scareware
B. Intranet B. Ransomware
C. Internet C. Spyware
D. WAN D. Trojan
10.2 CONFIDENTIALITY
1. A(n) is a keyless substitution cipher 4. In the DES algorithm the Round Input is 32
with N inputs and M outputs that uses a bits, which is expanded to 48 bits via
formula to define the relationship between A. Scaling of the existing bits
the input stream and the output stream
B. Duplication of the existing bits
A. S-box
C. Addition of zeros
B. P-box
D. Addition of ones
C. T-box
5. AES uses a bit block size and a key size
D. none of the mentioned
of bits.
2. DES was designed to increase the size A. 128; 128 or 256
of DES Key
B. 64; 128 or 192
A. Double
C. 256; 128, 192, or 256
B. Triple
D. 128; 128, 192, or 256
C. Quadruple
6. Which is the largest disadvantage of the
D. None of the mentioned
symmetric Encryption?
3. The number of unique substitution boxes A. 1.More complex and therefore more
in DES after the 48 bit XOR operation are time-consuming calculations.
A. 8 B. 2.Problem of the secure transmission
B. 4 of the Secret Key.
C. 6 C. 3.Less secure encryption function.
D. 12 D. 4.Isn’t used any more.
7. The acronym AES stands for? 13. The method provides a one-time ses-
A. American Encryption Standard sion key for two parties
18. What is data encryption standard (DES)? D. 4.The key prevents the user of having
to reinstall the software at each change in
A. block cipher
technology or in the functions for encryp-
B. stream cipher tion.
C. bit cipher 20. In asymmetric key cryptography, the pri-
D. byte cipher vate key is kept by
A. Sender
19. Which is the principle of the encryption us-
NARAYAN CHANGDER
ing a key? B. Receiver
C. Sender & Receiver
A. 1.The key indicates which funcion is
used for encryption. Thereby it is more D. All connected devices to the network
difficult to decrypt a intercepted message
21. The DES Algorithm Cipher System consists
as the function is unknown.
of rounds (iterations) each with a
B. 2.The key contains the secret function round key
for encryption including parameters. Only
A. 12
a password can activate the key.
B. 18
C. 3.All functions are public, only the key
is secret. It contains the parameters used C. 9
for the encryption resp. decryption. D. 16
6. PKI stands for 12. Who really checks the validity of a Digital
A. Public Key Interchange certificate?
NARAYAN CHANGDER
A. Jill’s private key may not belong to Jill.
18. What cryptographic algorithm is used by
the NSA and includes the use of elliptical B. Jill’s public key may not belong to Jill.
curves for digital signature generation and C. Jack’s public key may not belong to
key exchange? Jack.
A. ECC D. Jack’s private key may not belong to
B. AES Jack.
C. IDEA 24. is not a processing stage in SHA com-
D. RSA putation
A. Append Padding bits
19. To verify a digital signature we need the
B. Append Length
A. Sender’s Private key
C. Initialize Hash Buffer
B. Sender’s Public key
D. Append MAC
C. Receiver’s Private key
D. Receiver’s Public key 25. Padding in MD5 is done so that the length
L of the message satisfies which formula?
20. SHA and MD5 are examples of: A. L = 446 mod 512
A. symmetric block ciphers B. L = 896 mod 1024
B. Asymmetric block ciphers C. L = 324 mod 512
C. Stream ciphers D. L = 128 mod 512
D. Message signing algorithms E. L = 448 mod 512
21. If Bob receives Alice’s public key from a 26. A digital certificate associates
public directory, how does he know the
A. the user’s identity with his public key
key really came from Alice?
B. a user’s private key with the public key
A. From acknowledgement from Alice
C. a private key with a digital signature
B. From a trusted certificate authority
D. a user’s public key with his private key
C. From your browser database
D. From Alice server 27. The element of digital signature:
A. Public Key & Private Key.
22. Which of the following are the different
classes of message authentication func- B. Biometric.
tion? C. Advanced biometric.
A. hash function D. Public key
28. A centralized directory of digital certifi- 33. Which of the following is not contained in
cates is called a(n) a digital certificate?
B. Signature verifying algorithm 38. MD5 uses bits for Digest Length
C. Signing algorithm A. 128
D. Authentication B. 160
NARAYAN CHANGDER
C. Certificate authority
C. Hash
D. In a written note that is send via email
D. Encrypting Symmetric key with the
public key of receiver 45. The public key is for the sender and it is:
40. ElGamal encryption system is A. Used to decrypt the message.
A. symmetric key encryption algorithm B. Just the owner know the key.
B. asymmetric key encryption algorithm C. Used to make a digital signature.
C. not an encryption algorithm D. Cannot be shared
D. none of the mentioned 46. Which algorithm algorithm provides the
41. The hash value it will change when: private key and its corresponding public
key?
A. The data doesn’t have a changed.
A. Key generation algorithm
B. The data have changed.
B. Signature verifying algorithm
C. Every time when opening the data.
C. Signing algorithm
D. The value will not changed for ever.
D. None of the above
42. What is symmetric encryption?
47. Cryptographic hash function takes an arbi-
A. Encryption that uses a pair of keys to
trary block of data and returns
encrypt and decrypt messages when com-
municating A. fixed size bit string
B. Encryption that is made up of exactly B. variable size bit string
similar parts facing each other or around C. both fixed size bit string and variable
an axis size bit string
C. Encryption that uses one key that must D. variable sized byte string
be shared among the people receiving a
message 48. Which of the following factors ensures
D. Encryption that has parts which fail to that the message is real, accurate, and
correspond to one another in shape, size, safeguards from unauthorized user modi-
or arrangement fication during the transmission
A. Confidentiality
43. What is a genesis block?
B. Integrity
A. The first block of a Blockchain
B. A famous block that hardcoded a hash C. Availability
of the Book of Genesis onto the blockchain D. Authentication
49. Release of message contents to any per- 54. In mutual authentication, the problem
son or process not possessing the appro- faced by authentication key exchange is
priate cryptographic key is called
59. Which 128-bit block cipher encryption al- 64. SHA1 uses bits for Digest Length
gorithm does the US government use to A. 128
protect classified information?
B. 160
A. Skipjack
C. 256
B. Vignere
D. 512
C. Caesar
65. Which of the following brought the
D. AES
blockchain implementation to the lime-
NARAYAN CHANGDER
E. 3DES light?
60. An entity that issues digital certificates is A. Bitcoin
a B. Ethereum
A. Certificate Authority (CA) C. Zcash
B. Signature Authority (SA) D. None of the above
C. Certificate Signatory (CS)
66. Blockchain can be stored as which of the
D. Digital Signer (DS) following?
61. Which signature allows a user to sign a A. A flat file
single document digitally? B. A database
A. Approval Signatures C. Both of the above
B. Certified Signatures D. None of the above
C. Visible Digital Signature 67. In HMAC, the block obtained as a result
D. Invisible Digital Signature of XOR operation between K+ and opad is
?
62. A hashing function for digital signature(i)
must give a hashed message which is A. So
shorter than the original message(ii) must B. Si
be hardware implementable(iii) two dif- C. Ki
ferent message should not give the same
D. Ko
hashed message(iv) is not essential for im-
plementing digital signature 68. Communication between end systems is
A. i and ii encrypted using a key, often known as
B. ii and iii A. Temporary key
C. i and iii B. section key
D. iii and iv C. line key
D. session key
63. What term is used to describe concealing
data in another file such as a graphic, au- 69. Side channel attacks could be done using
dio, or other text file?
A. masking A. Cache
B. obfuscation B. Acoustics
C. steganography C. Electromagnetic radiation
D. hiding D. all of these
70. The Digital Signature Standard (DSS) cre- 75. Which of the following ensures Integrity in
ates a signature of size a digital signature?
71. Which of the following in Digital Signa- D. Encrypting Symmetric key with the
tures may be relied upon to prove that an public key of receiver
online form was authorized by a specific
76. If Bob wants to send a encrypted message
person?
to Alice, which key does he use?
A. Nonrepudiation
A. Bob private key
B. Encryption
B. Bob public key
C. Confidentiality
C. Alice public key
D. Integrity
D. Alice private key
72. What powers the Ethereum Virtual Ma-
chine? 77. performs a real-time lookup of a digi-
A. Gas tal certificate’s status.
74. Examples of a nonce are 79. Man-in-the middle attack can be overcome
A. Message Number with the use of
80. Which authentication protocol uses a 85. What are the types of certificates?
timestamp to assure the session key has A. Signature & Encryption.
just been generated?
B. Public key & Private key.
A. Needham-Schroeder protocol
C. Electronic & Biometric.
B. Symmetric encryption protocol
D. All.
C. Mutual authentication protocol
86. Where do you store your cryptocurrency?
D. Denning protocol
NARAYAN CHANGDER
A. Bank account
81. One of the features in the Pertamina B. Floppy Disk
Shield, namely
C. Wallet
A. OTP & Token and Biometric Verifica-
tion D. In your pocket
B. OTP & Token and Worker Number 87. A digital signature needs a
C. Resident number and Biometric Verifi- A. Private-key system
cation B. Shared-key system
D. Worker Number and Worker e-mail C. Public-key system
82. The responsibility of a certification author- D. All of them
ity for digital signature is to authenticate
88. Hashed message is signed by the sender
the
using
A. hash function used
A. his public key
B. private keys of subscribers B. his private key
C. public keys of subscribers C. receiver’s public key
D. key used in DES D. receiver’s private key
83. The use of digital signatures 89. Message authentication code is also
A. Requires the use of a one-time pass- known as
word generator. A. key code
B. Provides encryption to a message. B. hash code
C. Validates the source of a message. C. keyed hash function
D. Ensures message confidentiality. D. message key hash function
84. In asymmetric encryption process. Each 90. What are the global public key components
communicating party starts with how used in DSS?
many keys? A. p, q, g, h
A. 5 B. p
B. 4 C. h
C. 3 D. g
D. 2 E. p, q, g
NARAYAN CHANGDER
C. He saw someone who looks like him on
the internet. B. Denial-of-service attack
D. He was able to access someone else’s C. Brute force attack
information. D. Exploit
10. A malicious program that attaches itself to 15. The prevention efforts to avoid malware,
an executable piece of software, and then except
reproduces itself when the file is run.
A. Avoid installing using pirated software
A. Worm
B. Perform operating system and an-
B. Trojan horse
tivirus updates
C. Malware
C. Watch YouTube
D. Virus
D. Turn on the firewall on your computer
11. What does a firewall do?
16. example of DDos?
A. Blocks unwanted data from the Inter-
net A. sell something
B. Installs Viruses B. have data stolen
C. Give you SD cards C. to pretend to be someone who is not
D. Blocks all content D. none of above
12. What type of chair should you use whilst 17. The programs which is designed to spread
using IT equipment? themselves to programs or infect other
files is
A. Comfortable
B. One with wheels A. Spoofing
C. Adjustable B. Worm
NARAYAN CHANGDER
money to travel home.
A. Bill Bourne and Ray Tomlinson D. All of the above!
B. Bills Gates and Paul Allen
35. Rose just installed a new search engine
C. Xiaochao and Sophie Wilson on her laptop.now whenever she searches
D. Paul Allen and Ben Amstrong the internet, she gets several pop-up win-
dows directing her to buy products.what
30. are messages that try to trick you into
does rose have?
providing sensitive information.
A. ransomware
A. Phishing scams
B. spyware
B. HTTPS
C. Cookie scams C. Adware
31. The illegal use, copying or distributing 36. Which is the correct term? Software that
of software without ownership or legal monitors all data arriving and leaving your
rights. computer.
A. Counterfeiting A. Encryption
B. Software piracy B. Virus
C. Internet piracy C. Backup
D. Impersonation D. Firewall
32. What is SSL 37. solution for a virus
A. Secure Socket Layer A. Delete any temporary files
B. Standard Secure Layer B. Restart the computer in safe mode
C. Security Standard Layer C. install an antivirus
D. Security Stabilization Layer D. none of above
33. In order to safeguard your important data
38. What should a strong password include?
you should backup your files. What does
this mean? A. At least one upper case letter
A. Take a copy of the original files B. Short, easy to guess words
B. Put your files in a safe place C. Date of birth
C. Print out your files D. At least one number
D. Store all your files in the cloud E. At least 8 characters
39. The process of having copies of data in 44. The illegal use of someone else’s personal
another environment is called “BACKUP”. information (as a Social Security number)
Also, backup is to take precautions to re- in order to obtain money or for some other
C. A type of network attack that involves 56. Files that turn into shortcuts can be af-
NARAYAN CHANGDER
flooding a target with traffic to disrupt its fected by ?
normal operation A. Worm
D. A type of cyber attack that involves B. Virus
stealing personal data from a computer
network C. Spoofing
D. Spam
51. Information that is readable without per-
forming any cryptographic operations. 57. You can download from the Net; this
A. cryptography type of software is available free of
charge but protected by copyright
B. plaintext
A. Firewall
C. encryption
B. Crucial
D. decryption
C. Encryption
52. Which one is NOT a function of a proxy D. Freeware
server?
A. Enables anonymous surfing 58. In your opinion, internet security is
53. Most is designed to obtain personal in- 59. Install non-original software is included in
formation without the user’s permission
A. Obtains A. Virus
B. Spyware B. Hole
C. Hacker C. Hack
D. A freeware D. Spoofing
61. What is a cookie in relation to the Inter- 65. In relation to computers, what is a virus?
net? A. A program that secretly watches your
B. A type of virus that spreads through B. A program that damages files and your
email attachments hard drive and affects the computer’s op-
eration
C. A program that allows remote access
C. A URL that may lead the user to down-
to a computer
load a video file
D. A form of encryption used to secure on- D. A program that is useful to download
line transactions from the Internet
62. Which of the following payment methods 66. Rajesh receives emails asking him to send
are safe for online transactions? Check all his bank account numbers in order to re-
that apply. ceive the money from a lottery he has won.
What is the sender of the email doing?
A. Cash
A. Hacking
B. PayPal and similar online payment ser-
vices B. Phishing
C. Counterfeiting
C. Bank account transfer
D. Spamming
D. Check
67. What is Data Protection.
63. Which of the following is NOT recom- A. The protection of all
mended when creating a strong pass-
B. The protection of a businesses sales
word?
data.
A. longer than six characters C. How the government keeps our infor-
B. generator to create more random mation safe.
passwords D. The protection of people’s personal in-
C. same password for multiple accounts formation.
D. numbers, symbols, and special charac- 68. Which of the following is an example of
ters natural loss?
A. Flooding
64. what is DDoS?
B. Not saving your file by accident
A. Distributed denial-of-service attacks C. Spilling water on your file
target websites and online services
D. A virus that deletes all your files
B. The gaming industry has also been a
target of DDoS attacks 69. What is the Internet?
A. A network of networks
C. The aim is to overwhelm them with
more traffic than the server or network B. A single network
can accommodate. C. A computer program
D. none of above D. A type of software
70. a solution for the phishing? 74. When u receive a question about your per-
A. you can change the password and not sonal information by a stranger you
tell anyone A. You will tell them all your personal in-
B. say your password to all the people formation
C. say the password a your best friend B. You will tell a trusted adult
NARAYAN CHANGDER
71. What should be protected while on the in- D. you will tell your baby sibling
ternet, except?
A. Personal data 75. What is a browser cookie?
10.5 FIREWALLS
1. Which type of firewall prevents access 5. Service can have two meanings in com-
based on site ratings and classifications? puter terminology:a) A service can be a
A. HIDS specific application or function such as
email, chat, etc. b) A service can refer to
B. Content filter a specific part of an application, such as
C. DMZ transmitting the data of a web page
D. Packet-filtering firewall A. network topology
2. Malicious software that bypasses the nor- B. LAN
mal, secure, or restricted access. C. services
A. worm D. short message service (SMS)
B. backdoor
6. An extension of network address transla-
C. trojan horse tion that associates a port number with a
D. spyware request from a private host
NARAYAN CHANGDER
the hardware clock on the server with A. IP address
an external time source on the internet.
B. MAC address
Now, you must configure the firewall on
your network to allow time synchroniza- C. Session ID
tion traffic through.Which of the following D. Username and password
ports are you most likely to open on the
firewall? 14. An agreed-upon method for communica-
tion.
A. 80
B. 119 A. firewall
C. 110 B. router
D. 123 C. server
D. protocol
10. Of the following security zones, which one
can serve as a buffer network between a 15. A computer shared by multiple users
private secured network and the untrusted across a network. It usually contains re-
internet? sources such as files, computer applica-
A. Intranet tions, or large databases.
C. Extranet B. server
D. DMZ C. LAN
D. firewall
11. Where is the optimal place to have a proxy
server? 16. Which port does Telnet use?
A. In between two private networks A. 23
B. In between a private network and a B. 25
public network
C. 80
C. In between two public networks
D. 34
D. On all of the servers
17. What types of firewalls are there:
12. Which of the following prevents access
based on website ratings and classifica- A. Hardware and Software.
tions? B. Physical and logical.
A. NIDS C. No correct answer.
B. DMZ D. none of above
18. What does NGFW stand for? C. Institute that provides security ser-
A. Next-Generation Firewall vices
A. Web server, DNS server, and DHCP 32. What is an essential component of IT secu-
server rity, the first line of defense from the net-
work outside the protected perimeter?
B. Web server, DNS server, and email
server A. Firewall
C. Web server and email server B. VPN
D. Email server, Newsgroup server, and C. DNS
DNS server D. Router
NARAYAN CHANGDER
29. When designing a firewall, what is the rec- 33. What is Stateful Firewalls?
ommended approach for opening and clos-
A. They use a simple policy table lookup
ing ports?
that filters traffic based on specific crite-
A. Close all ports; open ports 20, 21, 53, ria.
80, and 443. B. all of the above
B. Close all ports C. They provide stateful packet filtering,
C. Close all ports; open only ports re- using connection information held in a
quired by applications inside the DMZ. state table.
D. Open all ports; close ports that expose D. None of the above
common network attacks.
34. How does a proxy server differ from a
E. Open all ports; close ports that show packet filtering firewall?
improper traffic or attacks in progress.
A. A proxy server operates at the Applica-
30. Which of the following does a router acting tion layer, while a packet filtering firewall
as a firewall use to control which packets operates at the Network layer.
are forwarded or dropped? B. A proxy server includes filters for the
A. ACL session ID as well as the IP address and
port number.
B. IPsec
C. A proxy server can prevent unknown
C. RDP network attacks, while a packet filtering
D. VNC firewall can only prevent known attacks.
D. A proxy server is used to create a DMZ,
E. PPP
while a packet filtering firewall can only be
31. After blocking a number of ports to secure used for screened subnets.
your server, you are unable to send email.
35. You are monitoring network traffic on your
To allow email service, which of the follow-
network, and you see traffic between two
ing needs to be done?
network hosts on port 1720. What is the
A. Open port 80 to allow SNMP service. source of this network traffic?
B. Open port 80 to allow SMTP service. A. A workstation is using the DNS proto-
col to send a name resolution request to
C. Open port 25 to allow SMTP service.
a DNS server.
D. Open port 110 to allow POP3 service.
B. Someone is downloading files from a
E. Open port 25 to allow SNMP service. server using the FTP protocol.
45. Which of the following are characteris- D. The workstation is synchronizing its lo-
tics of a packet filtering firewall? (Select cal time with the time on the server.
two.)
A. Stateful 50. Software that scans content to identify
and dispose of phishing attempts
B. Stateless
A. web filter
C. Filters by session
D. Filters by URL B. web threat filter
NARAYAN CHANGDER
E. Filters IP addresses, but not ports C. spam filter
B. A denial of service (DoS) attack on the A. 80 for HTTP; 443 for SSL
server is in progress. B. 443 for HTTP; 80 for SSL
C. The workstation is accessing mes-
C. 160 for HTTP; 440 for SSL
sages from the email service on the
server. D. 440 for HTTP; 160 for SSL
55. Check the alternative that presents the 59. What is Socket Programming?
main focus of packet filters (iptables)
A. A way to filter network traffic
63. You are an administrator for a large com- D. Use a single firewall. Put the web
pany. You are setting up a computer at server and the private network behind the
a worker’s home so he can telecommute firewall.
while he recovers from surgery. You want
to connect to the UNIX server at the office 67. In cybersecurity terms, a vulnerability is a
to update his account information.Which weakness in a system that allows an at-
utility should you use to accomplish this tacker to gain unauthorized access.
task? A. WAN
NARAYAN CHANGDER
A. Telnet B. vulnerabilities
B. Traceroute C. worm
C. FTP D. backdoor
D. Ping
68. What firewall entries can be examined to
64. On which OSI layer does a transparent fire- help troubleshoot communication problems
wall operate? or identify potential attacks?
A. Layer 3 A. log entries
B. Layer 5 B. access control lists
C. Layer 7 C. filtering rules
D. Layer 2 D. encrypted packets
65. SMTP is on port 69. What do the following rules do? a)
A. 23 iptables-A INPUT-s 221.194.47.0/24-
j REJECTb) iptables-D INPUT-s
B. 24
221.194.47.0/24-j REJECT
C. 25
A. a )adds the rule in the input chain; b)
D. 110 deletes the rule from the chain
66. You have a company network that is con- B. a ) adds the rule in the input chain; b)
nected to the internet. You want all users added the rule in the destination chain
to have internet access, but you need to C. a ) adds the rule in the input chain; b)
protect your private network and users. added the rule in the destination chain
You also need to make a web server pub-
licly available to internet users.Which so- D. none of above
lution should you use?
70. A network device that controls and filters
A. Use firewalls to create a DMZ. Place data between networks, either wired or
the web server inside the DMZ and the pri- wireless. It is a specific type of “gate-
vate network behind the DMZ. way”, a device that acts as a gate be-
B. Use firewalls to create a DMZ. Place tween two networks.
the web server and the private network A. backdoor
inside the DMZ.
B. server
C. Use a single firewall. Put the web
server in front of the firewall and the pri- C. router
vate network behind the firewall. D. protocol
81. A category of software firewall consists of 85. A type of software firewall installed on
applications that are installed on servers a host and used to protect the host from
used to protect network segments from network-based attacks.
other network segments. A. host firewall
A. network firewall B. statefull firewall
NARAYAN CHANGDER
B. stateful firewall C. Application Firewall
C. personal firewall D. VPN
D. Chinese great wall
86. A small startup company has hired you to
82. Your company has a connection to the in- harden their new network.Because funds
ternet that allows users to access the in- are limited, you have decided to imple-
ternet. You also have a web server and ment a unified threat management (UTM)
an email server that you want to make device that provides multiple security fea-
available to internet users. You want to tures in a single network appliance:* Fire-
create a DMZ for these two servers.Which wall* VPN* Anti-spam* AntivirusYou join
type of device should you use to create the the UTM device to the company’s Active Di-
DMZ? rectory domain. The company’s traveling
sales force will use the VPN functionality
A. IPS
provided by the UTM device to connect to
B. IDS the internal company network from hotel
C. Host-based firewall and airport public Wi-Fi networks.Which
weaknesses exist in this implementation?
D. Network-based firewall
A. The UTM device should not be joined to
E. VPN concentrator
the Active Directory domain.
83. Which of the following does a circuit proxy B. The UTM represents a single point of
filter firewall do? failure.
A. Verifies the sequencing of session C. Remote users should not establish
packets VPN connections to the internal network
B. Examines the entire message contents using public Wi-Fi networks.
C. Operates at the application layer D. Anti-spam and antivirus functions
must be placed on separate servers.
D. none of above
87. Which of the following features are com-
84. Which of the string sets below is preconfig-
mon functions of an all-in-one security ap-
ured in the NAT table of the Linux iptables
pliance? (Select two
command?
A. INPUT, FORWARD e OUTPUT A. Password complexity
B. they are a virus and can be destructive keeping services that have external access
C. keep track of your searches and web- separate from the local network, is called
sites visited a
NARAYAN CHANGDER
cian. E. VPN
B. An office with a dedicated network
closet. 102. Which of the following is likely to be lo-
cated in a DMZ?
C. A company that transmits large
amounts of time-sensitive data. A. Domain controller
D. A credit card company that stores cus- B. User workstations
tomer data.
C. Backup server
98. Software that is installed on a computing D. FTP server
device to prevent viruses from infecting
the device. 103. Software that secretly collects informa-
A. Antivirus tion about you. It usually resides on a
website or in a service such as your email
B. Firewall program.
C. Phishing
A. spyware
D. Spyware
B. trojan horse
99. Windows Firewall is a built-in. host- C. worm
based, firewall.
D. virus
A. Stateful
B. Network Layer 104. Stateless firewalls operate in in the
OSI model
C. Packet Filter
A. Layer 3
D. stateless
B. Layer 2
100. A web filter that prevents users from vis-
iting websites with known malicious con- C. Layer 7
tent D. Layer 5
A. web filter
105. Which port number is used by SNMP?
B. web threat filter
A. 25
C. spam filter
B. 110
D. anti-phishing software
C. 119
101. The subnet, also known as the perimeter
D. 143
network, used to transmit information be-
tween a trusted and an untrusted network, E. 161
106. iptables is used to configure, maintain 110. Which protocol and port number is used
and inspect IPv4 packet filtering rule ta- by TFTP?
bles in the Linux kernel. Several differ-
NARAYAN CHANGDER
C. Domain Controller
email or web servers?
D. Router
A. ACL
B. Perimeter firewall 122. Advertising software that can automati-
cally download files or link to websites. It
C. DMZ
is often unasked-for and can contain mal-
D. Host-based firewall ware.
117. On which OSI layer does a circuit-level A. network topology
proxy operate? B. trojan horse
A. Layer 3 C. adware
B. Layer 5 D. WAN
C. Layer 7 123. Your Cisco router has three network in-
D. Layer 2 terfaces configured:* S0/1/0 is a WAN
interface that is connected to an ISP.*
118. What is a virus? F0/0 is connected to an Ethernet LAN
A. Malware hidden in another file segment with a network address of
B. Any type of malware 192.168.1.0/24.* F0/1 is connected to
an Ethernet LAN segment with a network
C. A cookie address of 192.168.2.0/24.You have con-
D. A breed of gecko figured an access control list on this
router using the following rules:* deny
119. Hyper-text transfer protocol; the rules of ip 192.168.1.0 0.0.0.255 any* deny ip
communication that web sites use to ex- 192.168.2.0 0.0.0.255 anyThese rules
change data. will be applied to the WAN interface on the
A. HTTP router. Your goal is to block any IP traffic
B. TCP/IP coming in on the WAN interface that has a
spoofed source address that makes it ap-
C. protocol pear to be coming from the two internal
D. web server networks.However, when you enable the
ACL, you find that no traffic is being al-
120. What is DNS? lowed through the WAN interface. What
A. A programming language should you do?
B. A network security protocol A. Add a permit statement to the bottom
C. A decentralised naming system that of the access list.
associates domain names with IP ad- B. Apply the access list to the Fa0/0 inter-
dresses face instead of the S0/1/0 interface.
C. Apply the access list to the Fa0/1 in- browse the Internet. You are able to con-
terface instead of the S0/1/0 interface. nect to this FTP server from home. What
could be blocking the connection to the
132. You want to allow users to download Its main role is to be a “buffer” net-
files from a server running the TCP/IP pro- work between the external and internal
tocol. You want to require user authentica- networks.IV. The configuration is carried
tion to gain access to specific directories on out through the use of Firewall equipment,
the server.Which TCP/IP protocol should which will carry out the access control be-
you implement to provide this capability? tween it, the local network and the Inter-
A. TCP net.
NARAYAN CHANGDER
C. IP B. II.
NARAYAN CHANGDER
B. adware
multiple private IP addresses into a single
registered IP address C. popup
A. NAT D. operating system
B. NAC
153. What can spyware monitor?
C. NAP
A. Websites and Keystrokes
D. NAV
B. How many dogs/cats you have
149. Enhancements, improvements, and prob-
lem fixes for software. C. Network Devices
B. L2F A. 25
C. L2TP B. 110
D. IPsec C. 220
NARAYAN CHANGDER
cuit proxy filter firewall? (Select two.)
C. Host Firewall
A. Operates at the Session layer.
D. honey net
B. Operates at the Network and Trans-
port layers. 172. Service running on Port 80 TCP is most
C. Operates at the Application layer. likely
170. On which OSI layer does an application- 175. Remote Desktop Protocol(RDP) runs on
level proxy operate? port
A. Layer 3 A. 3389
B. Layer 5 B. 389
C. Layer 7 C. 143
D. Layer 2 D. 53
NARAYAN CHANGDER
D. SSL is blocking internet traffic.
D. Performing a name resolution request
184. What is a worm?
A. Malware that copies to other PCs 186. Which of the following are characteristics
across a network of a circuit-level gateway? (Select two.)
B. A creature stuck inside your pc case A. Stateful
C. A virus B. Stateless
D. A virus that enters into your system via
C. Filters by session
another file
D. Filters by URL
185. In the output of the netstat command,
you notice that a remote system has E. Filters IP addresses, but not ports