Description : ....... was the first step in the evolution of Ethernet from a coaxial cable bus to hub managed, twisted pair network. A) Star LAN B) Ring LAN C) Mesh LAN D) All of the above
Last Answer : A) Star LAN
Description : Which of the following is/ are the drawbacks of Ring Topology? A) Failure of one computer, can affect the whole network B) Adding or removing the computers disturbs the network activity. C) If the central hub fails, the whole network fails to operate. D) Both of A and B
Last Answer : D) Both of A and B
Description : The computer network is A) Network computer with cable B) Network computer without cable C) Both of the above D) None of the above
Last Answer : C) Both of the above
Description : The type of threats on the security of a computer system or network are …………………….. i) Interruption ii) Interception iii) Modification iv) Creation v) Fabrication A) i, ii, iii and iv only B) ii, iii, iv and v only C) i, ii, iii and v only D) All i, ii, iii, iv and v
Last Answer : C) i, ii, iii and v only
Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks ... only C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Last Answer : B) i, iii, iv and v only
Description : This is a global collection of high-powered computer that are connected together with cables, telephone lines, microwave dishes, satellites etc. A) Arpanet B) Internet C) Network
Last Answer : B) Internet
Description : Four bits are used for packed sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size ? (A) 4 (B) 8 (C) 15 (D) 16
Last Answer : (C) 15
Description : A simple cabling method, known as the ……………… topology allows about 30 computers on a maximum cable length of about 600 feet. A) Ring B) Bus C) Star D) Mesh
Last Answer : B) Bus
Description : .......... is the predominant form of Fast Ethernet, and runs over two pairs of category 5 or above cable. A) 100 BASE-T B) 100 BASE-TX C) 100 BASE-T4
Last Answer : B) 100 BASE-TX
Description : Which one of the following media is multidrop? (A) Shielded Twisted pair cable (B) Unshielded Twisted pair cable (C) Thick Coaxial cable (D) Fiber Optic cable
Last Answer : (C) Thick Coaxial cable
Description : In a fast Ethernet cabling, 100 Base-TX uses ........... cable and maximum segment size is ............ (A) twisted pair, 100 metres (B) twisted pair, 200 metres (C) fibre optics, 1000 metres (D) fibre optics, 2000 metres
Last Answer : (A) twisted pair, 100 metres
Description : A ……….. is a graph that has weights of costs associated with its edges. A) Network B) Weighted graph C) Both A and B D) None A and B
Last Answer : C) Both A and B
Description : ........ implies that all subnets obtained from the same network use the subnet mask. A) Static subnetting B) Dynamic Subnetting C) Variable length subnetting D) Both B and C
Last Answer : A) Static subnetting
Description : Which of the following statement is true? i) An address with all bits 1 is interpreted as all networks or all hosts. ii) The class A network 128.0.0.0 is defined as the loopback network. A) i only B) ii only C) Both A and B D) None of the above
Last Answer : A) i only
Description : The................. layer is responsible for resolving access to the shared media or resources. A) Physical B) Mac sub layer C) Network D) Transport
Last Answer : B) Mac sub layer
Description : Native – protocol pure Java converts ……….. into the ………… used by DBMSs directly. A) JDBC calls, network protocol B) ODBC class, network protocol C) ODBC class, user call D) JDBC calls, user call
Last Answer : A) JDBC calls, network protocol
Description : …………………. is a group of interested components working together towards a common goal by accepting inputs and producing outputs in an organized transformation process. A) System B) Network C) Team D) System Unit
Last Answer : A) System
Description : State True of False. i) Network is a graph that has weights or costs associated with it. ii) An undirected graph which contains no cycles is called a forest. iii) A graph is said to be complete if there is no ... ) True, False, True B) True, True, False C) True, True, True D) False, True, True
Last Answer : B) True, True, False
Description : Which of the following is not a logical database structure? A) Chain B) Network C) Tree D) Relational
Last Answer : A) Chain
Description : A top-to-bottom relationship among the items in a database is established by a A) Hierarchical schema B) Network schema C) Relational Schema D) All of the above
Last Answer : A) Hierarchical schema
Description : The …………………………. Is a collection of protocols designed by Internet Engineering Task Force(IETF) to provide security for a packet at the Network level. A) IPsec B) Netsec C) Packetsec D) Protocolsec
Last Answer : A) IPsec
Description : A ………………. is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection. A) VNP B) VPN C) VSN D) VSPN
Last Answer : B) VPN
Description : State true or false. i) Socks are a standard for circuit level gateways. ii) The NAT is used for small number of the hosts in a private network. A) True, False B) False, True C) True, True D) False, False
Last Answer : D) False, False
Description : ………………….. is used to carry traffic of one protocol over network that does not support that protocol directly. A) Tunneling B) Transferring C) Trafficking D) Switching
Last Answer : A) Tunneling
Description : A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ……………… A) Chock point B) meeting point C) firewall point D) secure point
Last Answer : A) Chock point
Description : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv
Last Answer : D) All i, ii, iii and iv
Description : The ……………… layer is responsible for resolving access to the shared media or resources. A) Physical B) Mac sub layer C) Network D) Transpor
Description : ………………….. is responsible for converting the higher level protocol addresses (IP addresses) to physical network addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)
Last Answer : A) Address Resolution Protocol (ARP)
Description : The combination of ……………. And ………….. is often termed the local address of the local portion of the IP address. A) Network number and host number B) Network number and subnet number C) Subnet number and host number D) All of the above
Last Answer : C) Subnet number and host number
Description : ………… is another kind of fiber optic network with an active star for switching. A) S/NET B) SW/NET C) NET/SW D) FS/NE
Last Answer : A) S/NET
Description : ........ is responsible for converting the higher level protocol addresses to physical Network Addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)
Last Answer : D) Internet Control Message Protocol (ICMP)
Description : The combination of ........... and ............ is often termed the local address or the local portion of the IP Address. A) Network number and host number B) Network number and subnet number C) Subnet number and host number.
Last Answer : C) Subnet number and host number.
Description : .............. is another kind of fiber optic network with active star for switching. A) S/NET B) SW/NET C) NET/SW D) FS/NET
Description : Which is not the Regional Internet Registers (RIR) of the following? A) American Registry for Internet Numbers (ARIN) B) Europeans Registry for Internet Numbers (ERIN) C) Reseaux IP Europeans (RIPE) D) Asia Pacific Network Information Centre (APNIC)
Last Answer : B) Europeans Registry for Internet Numbers (ERIN
Description : .................. address use 7 bits for the and 24 bits for the portion of the IP address. A) Class A B) Class B C) Class C D) Class D
Last Answer : A) Class A
Description : State whether the following is True or False. i) In bus topology, heavy Network traffic slows down the bus speed. ii) It is multipoint configuration. A) True, True B) True, False C) False, True D) False, False
Last Answer : A) True, True
Description : In a ................topology, if there are n devices in a network, each device has n-1 ports for cables. A) Mesh B) Star C) Bus D) Ring
Last Answer : A) Mesh
Description : In which OSI layers does the FDDI protocol operate? A) Physical B) Data link C) Network D) A and B
Last Answer : D) A and B
Description : Which layers of the OSI determines the interface often system with the user? A) Network B) Application C) Data link D) Session
Last Answer : B) Application
Description : Devices on one network can communicate with devices on another network via a ....... A) File Server B) Utility Server C) Printer Server D) Gateway
Last Answer : D) Gateway
Description : A network that needs human beings to manually route signals is called.... A) Fiber Optic Network B) Bus Network C) T-switched network D) Ring network
Last Answer : C) T-switched network
Description : What is the name of the network topology in which there are bi-directional links between each possible node? A) Ring B) Star C) Tree D) Mesh
Last Answer : D) Mesh
Description : Find out the OSI layer, which performs token management. A) Network Layer B) Transport Layer C) Session Layer D) Presentation Layer
Last Answer : C) Session Layer
Description : The performance of data communications network depends on .............. A) Number of users B) The hardware and software C) The transmission D) All of the above
Last Answer : D) All of the above
Description : Which of the following is an application layer service? A) Network virtual terminal B) File transfer, access and management C) Mail service D) All of the above
Last Answer : C) Mail service
Description : Which of the following are the network services? A) File service B) Print service C) Database service D) All of the above
Description : Internet is ................. A) Network of Networks B) Networks of Communication C) Networks of Data D) Group of LAN
Last Answer : A) Network of Networks
Description : Which of the following is a knowledge representation technique used to represent knowledge about stereotype situation? (A) Semantic network (B) Frames (C) Scripts (D) Conceptual Dependency
Last Answer : (C) Scripts
Description : In a fully connected mesh network with n devices, there are ................ physical channels to link all devices. (A) n(n–1)/2 (B) n(n+1)/2 (C) 2n (D) 2n+1
Last Answer : (A) n(n–1)/2
Description : A Network Schema (A) restricts to one to many relationship (B) permits many to many relationship (C) stores Data in a Database (D) stores Data in a Relation
Last Answer : (B) permits many to many relationship