Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
16 views4 pages

Computer Networking

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 4

Multiple Choice Questions of Computer 1-9 What is the use of Bridge in Network?

Networking A. to connect LANs B. to separate LANs


C. to control Network Speed D. All of the above
1-1 Computer Network is
A. Collection of hardware components and 1-10 Router operates in which layer of OSI
computers Reference Model?
B. Interconnected by communication channels A. Layer 1 (Physical Layer)
C. Sharing of resources and information B. Layer 3 (Network Layer)
D. All of the Above C. Layer 4 (Transport Layer)
D. Layer 7 (Application Layer)
1-2 What is a Firewall in Computer Network?
A. The physical boundary of Network 2-1 Each IP packet must contain
B. An operating System of Computer Network A. Only Source address
C. A system designed to prevent unauthorized B. Only Destination address
access C. Source and Destination address
D. A web browsing Software D. Source or Destination address

1-3 How many layers does OSI Reference Model 2-2 Bridge works in which layer of the OSI
has? model?
A. 4 B. 5 C. 6 D. 7 A. Application layer B. Transport layer
C. Network layer D. Datalink layer
1-4 DHCP is the abbreviation of
A. Dynamic Host Control Protocol 2-3 _______ provides a connection-oriented
B. Dynamic Host Configuration Protocol reliable service for sending messages
C. Dynamic Hyper Control Protocol A. TCP B. IP C. UDP D. All of the above
D. Dynamic Hyper Configuration Protocol
2-4 Which layers of the OSI model are host-to-
1-5 IPV4 Address is host layers?
A. 8 bit B. 16 bit C. 32 bit D. 64 bit A. Transport, Session, Presentation,
Application
1-6 DNS is the abbreviation of B. Network, Transport, Session, Presentation
A. Dynamic Name System C. Datalink, Network, Transport, Session
B. Dynamic Network System D. Physical, Datalink, Network, Transport
C. Domain Name System
D. Domain Network Service 2-5 Which of the following IP address class is
Multicast
1-7 What is the meaning of Bandwidth in A. Class A B. Class B C. Class C
Network? D. Class D
A. Transmission capacity of a communication
channels 2-6 Which of the following is correct regarding
B. Connected Computers in the Network Class B Address of IP address
C. Class of IP used in Network A. Network bit – 14, Host bit – 16
D. None of Above B. Network bit – 16, Host bit – 14
C. Network bit – 18, Host bit – 16
1-8 ADSL is the abbreviation of D. Network bit – 12, Host bit – 14
A. Asymmetric Dual Subscriber Line
B. Asymmetric Digital System Line 2-7 The last address of IP address represents
C. Asymmetric Dual System Line A. Unicast address B. Network address
D. Asymmetric Digital Subscriber Line C. Broadcast address D. None of above
2-8 How many bits are there in the Ethernet C. Packet switched network D. All of above
address?
A. 64 bits B. 48 bits C. 32 bits D. 16 bits 3-8. What does protocol defines?
A. Protocol defines what data is communicated.
2-9 How many layers are in the TCP/IP model? B. Protocol defines how data is communicated.
A. 4 layers B. 5 layers C. 6 layers D. 7 layers C. Protocol defines when data is
communicated.
2-10 Which of the following layer of OSI model D. All of above
also called end-to-end layer?
A. Presentation layer B. Network layer 3-9. What is the uses of subnetting?
C. Session layer D. Transport layer A. It divides one large network into several
smaller ones
3-1. Why IP Protocol is considered as B. It divides network into network classes
unreliable? C. It speeds up the speed of network
A. A packet may be lost D. None of above
B. Packets may arrive out of order
C. Duplicate packets may be generated 3-10. Repeater operates in which layer of the OSI
D. All of the above model?
A. Physical layer B. Data link layer
3-2. What is the minimum header size of an IP C. Network layer D. Transport layer
packet?
A. 16 bytes B. 10 bytes C. 20 bytes D. 32 bytes 4-1. What is the benefit of the Networking?
A. File Sharing B. Easier access to Resources
3-3. Which of following provides reliable C. Easier Backups D. All of the Above
communication?
A. TCP B. IP C. UDP D. All of the above 4-2. Which of the following is not the Networking
Devices?
3-4. What is the address size of IPv6 ? A. Gateways B. Linux C. Routers D. Firewalls
A. 32 bit B. 64 bit C. 128 bit D. 256 bit
4-3. What is the size of MAC Address?
3-5. What is the size of Network bits & Host bits A. 16-bits B. 32-bits C. 48-bits D. 64-bits
of Class A of IP address?
A. Network bits 7, Host bits 24 4-4. Which of the following can be Software?
B. Network bits 8, Host bits 24 A. Routers B. Firewalls C. Gateway
C. Network bits 7, Host bits 23 D. Modems
D. Network bits 8, Host bits 23
4-5. What is the use of Ping command?
3-6. What does Router do in a network? A. To test a device on the network is
A. Forwards a packet to all outgoing links reachable
B. Forwards a packet to the next free outgoing B. To test a hard disk fault
link C. To test a bug in a Application
C. Determines on which outing link a packet D. To test a Pinter Quality
is to be forwarded.
D. Forwards a packet to all outgoing links except 4-6. MAC Address is the example of
the originated link A. Transport Layer B. Data Link Layer
C. Application Layer D. Physical Layer
3-7. The Internet is an example of
A. Cell switched network 4-7. Routing tables of a router keeps track of
B. circuit switched network A. MAC Address Assignments
B. Port Assignments to network devices 5-6 What is the usable size of Network bits in
C. Distribute IP address to network devices Class B of IP address?
D. Routes to use for forwarding data to its A. 04 B. 08 C. 14 D. 16
destination
5-7 In which type of RAID, data is mirrored
4-8. Layer-2 Switch is also called between two disks.
A. Multiport Hub B. Multiport Switch A. RAID 0 B. RAID 1 C. RAID 2 D. RAID 3
C. Multiport Bridge D. Multiport NIC
5-8 What do you mean by broadcasting in
4-9. Difference between T568A and T568B is Networking?
A. Difference in wire color A. It means addressing a packet to all
B. Difference in number of wires machine
C. Just different length of wires B. It means addressing a packet to some
D. Just different manufacturer standards machine
C. It means addressing a packet to a particular
4-10. The meaning of Straight-through Cable is machineD. It means addressing a packet to
A. Four wire pairs connect to the same pin on except a particular machine
each end
B. The cable Which Directly connects Computer 5-9 Which of the following is/are Protocols of
to Computer Application?
C. Four wire pairs not twisted with each other A. FTP B. DNS C. Telnet D. All of above
D. The cable which is not twisted
5-10 Which of the following protocol is/are
5-1 Which of the following is not the External defined in Transport layer?
Security Threats? A. FTP B. TCP C. UDP D. B & C
A. Front-door Threats B. Back-door Threats
C. Underground Threats D. Denial of Service 6-1. What is the IP Address range of APIPA?
A. 169.254.0.1 to 169.254.0.254
5-2 What is the Demilitarized Zone? B. 169.254.0.1 to 169.254.0.255
A. The area between firewall & connection to C. 169.254.0.1 to 169.254.255.254
an external network D. 169.254.0.1 to 169.254.255.255
B. The area between ISP to Military area
C. The area surrounded by secured servers 6-2. Which of the following is correct in VLSM?
D. The area surrounded by the Military A. Can have subnets of different sizes
B. Subnets must be in same size
5-3 What is the full form of RAID ? C. No required of subnet D. All of above
A. Redundant Array of Independent Disks
B. Redundant Array of Important Disks 6-3. What does the port number in a TCP
C. Random Access of Independent Disks connection specify?
D. Random Access of Important Disks A. It specifies the communication process on
the two end systems
5-4 What is the maximum header size of an IP B. It specifies the quality of the data &
packet? connection
A. 32 bytes B. 64 bytes C. 30 bytes D. 60 bytes C. It specify the size of data
D. All of the above
5-5 What is the size of Host bits in Class B of IP
address? 6-4. The class-based addressing is also known
A. 04 B. 08 C. 16 D. 32 as
A. Modern Model B. Classful Model
C. Classless Model D. Heterogeneous Model 7-4. The duration of time it takes to send a
message from one end of a network to the other
6-5. Which of the following is correct in CIDR? and back is called
A. Class A includes Class B network A. Round Trip Time B. Full Duplex Time
B. There are only two networks C. Circle Trip Time D. Data Travelling Time
C. There are high & low class network
D. There is no concept of class A, B, C 7-5. Which of the following layer is not network
networks support layer?
A. Transport Layer B. Network Layers
6-6. What is the size of Source and Destination C. Data link Layer D. Physical Layer
IP address in IP header?
A. 4 bits B. 8 bits C. 16 bits D. 32 bits 7-6. For error detection ________ is used by the
higher layer protocols (TCP/IP).
6-7. Which of the following is reliable A. Bit-sum B. Checksum
communication? C. Data-sum D. Error-bit
A. TCP B. IP C. UPD D. All of them
7-7. The amount of data that can be carried from
6-8. What is the typical range of Ephemeral one point to another in a given time period is
ports? called
A. 1 to 80 B. 1 to 1024 C. 80 to 8080 A. Scope B. Capacity
D. 1024 to 65535 C. Bandwidth D. Limitation

6-9. What is the purpose of the PSH flag in the 7-8. Controlling access to a network by
TCP header? analyzing the incoming and outgoing packets is
A. Typically used to indicate end of message called
B. Typically used to indicate beginning of A. IP Filtering B. Data Filtering
message C. Packet Filtering D. Firewall Filtering
C. Typically used to push the message
D. Typically used to indicate stop the message 7-9. The management of data flow between
computers or devices or between nodes in a
6-10. What is the natural mask for a class C network is called
Network? A. Flow control B. Data Control
A. 255.255.255.1 B. 255.255.255.0 C. Data Management D. Flow Management
C. 255.255.255.254 D. 255.255.255.255
7-10. Which of the following is not the possible
7-1. DHCP Server provides _____ to the client. ways of data exchange?
A. Protocol B. IP Address A. Simplex B. Multiplex
C. MAC Address D. Network Address C. Half-duplex D. Full-duplex

7-2. A set of rules that govern all aspects of


information communication is called
A. Server B. Internet
C. Protocol D. OSI Model

7-3. The processes on each machine that


communicate at a given layer are called
A. UDP process B. Intranet process
C. Server technology D. Peer-peer process

You might also like