You are on page 1of 10

Sona College of Technology (Autonomous), Salem-5

Department of Information Technology


Computer Networks Moodle Questions

1. WAN cover a larger geographical area that MAN?


a. True
b. False
Answer: A

2. Metropolitan Area Network Normally Require a Internet connection?

a. True

b. False

Answer: A

3. What are the two basic network configurations?

Answer: peer-to-peer and server-based

4. In a peer-to-peer network, each computer can act as a _________ and a ________.

(Server, client)

5. In a bus topology, all the computers are connected in a series. To stop the signals from
bouncing, it is important that a ________ be connected to each end of the cable
terminator

6. In a star topology all segments are connected to a centralized component called a


__________.(Hub)

7. In a ________ topology, a break anywhere in the cable will cause the entire network to
go down. (Bus)

8. A ring topology passes a token from one segment to another. In order for a computer to
place data on the network, the computer must be in possession of the _______.(token)

9. Media access controls refer to the need to control when computers transmit.

A. True

B. False

Answer: A
10. The data link layer accepts messages from the network layer and controls the hardware
that transmits them.
a. True

b. False

Answer: A

11. Only the sender of a data transmission needs to be concerned about the rules or protocols
that govern how it communicates with the receiver.
a. True

b. False

Answer: B

12. Most computer networks managed by a host mainframe computer use contention media
access control.

a. True

b. False

Answer: B

13. Polling is the process of permitting all clients to transmit or receive at any time.

a. True

b. False

Answer: B

14. With roll-call polling, a server polls clients in a consecutive, pre-arranged priority list.
a. True

b. False

Answer: A

15. Token passing is a term that refers to hub polling, in which one computer starts a poll and
passes it to the next computer on a multipoint circuit.
a. True

b. False

Answer: A
16. With contention, a computer does not have to wait before it can transmit. A computer can
transmit at any time.
a. True

b. False

Answer: B

17. Contention is commonly used with Ethernet local area networks.


a. True

b. False

Answer: A

18. Controlled access MAC approaches work better in a large network with high usage.
a. True

b. False

Answer: A

19. In a network, the type of errors caused during data transmission can be controlled by the
network hardware and software.
a. True

b. False

Answer: A

20. If a computer transmits a message containing ABC and the destination computer
receives abc as the message, the message is corrupted.
a. True

b. False

Answer: A

21. Resource sharing refers to having users access the same data files, exchange information
via e-mail, or use the Internet.
a. True

b. False

Answer: B

22. LANs that run on radio frequencies use a type of wired media.
a. True

b. False

Answer: B

23. Fibre optic cable is thicker and heavier than unshielded twisted pair.

a. True

b. False

Answer: B

24. A computer network is a collection of connected computing devices that may


communicate and share resources.

a. True

b. False

Answer: A

25. Which one of the following statements is FALSE?


A. HTTP runs over TCP
B. HTTP describes the structure of web pages.

C. HTTP allows information to be stored in a URL

D. HTTP can be used to test the validity of a hypertext link


Answer: B

26. Which one of the following statements is FALSE?

A. TCP guarantees a minimum communication rate


B. TCP ensures in-order delivery
C. TCP reacts to congestion by reducing sender window size
D. TCP employs retransmission to compensate for packet loss
Answer: A
27. Which of the following is NOT true with respect to a transparent bridge and a router?
A. Both bridge and router selectively forward data packets
B. A bridge uses IP addresses while a router uses MAC addresses
C. A bridge builds up its routing table by inspecting incoming packets
D. A router can connect between a LAN and a WAN
Answer: B

28. Mr. Ravi has set up his office with 50 computers. He wants to connect computers and
peripheral devices within his office building with wires. Which type of network will you
suggest him to use?
ANSWER: WIRED NETWORK (LAN)
29. Which type of network architecture is the most suitable when a few number of
computers, having similar power and capacity, are to be networked together?
30. ANSWER: PEER TO PEER ARCHITECTURE.
31. Shagun wants to physically attach a computer to a network so that it can participate in
network communication. Which card will you suggest her to use?
ANSWER: NETWORK CARD
32. One of the functions of an access point is to serve as a base station for the wireless
network.
a. True

b. False

Answer: A

33. Although the transmission range of an access point can vary, the number of wireless
clients that it can support does not vary.
a. True

b. False

Answer: B

34. Power over Ethernet allows wireless client network adapter cards to be placed in
locations even though there is not an electrical outlet nearby
a. True

b. False

Answer: B

35. Both point-to-point and point-to-multipoint configurations can be supported by a remote


wireless bridge.
a. True

b. False
Answer: A

36. _____ Standards are not formal standards but are common practices that the industry
follows. De facto
37. Industry-sponsored organizations that want to promote a specific technology are known
as _____. consortia
38. TCP/IP is the suite of protocols and programs that support low-level network
communication.
a. True

b. False

Answer: A

39. ? A file's MIME type indicates the format of files that are attached to email messages.
a. True

b. False

Answer: A

40. The IP address of a computer is represented by four numeric values separated by periods
(dots).
a. True

b. False

Answer: A

41. UDP provides unreliable transfer of datagrams between client and server.

a. True

b. False

Answer: A

42. Protocols are not required to govern communication activity in the Internet.
a. True

b. False

Answer: B

43. The ISO/OSI reference Model has seven layers


a. True

b. False

Answer: A

44. Transport services and protocols provide logical communication between hosts.
a. True

b. False

Answer: B

45. Both UDP and TCP require that the applications recognize their own data formats.
a. True

b. False

Answer: A

46. Circuit switching is used to establish dedicated network paths that may be shared by other
end systems
a. True

b. False

Answer: B

47. Time and frequency division multiplexing schemes are used to divide link bandwidth into
separately allocable pieces.
a. True

b. False

Answer: A

48. TCP abstracts data communication to appear as an apparent stream of flowing data.
a. True

b. False

Answer: A

49. A Denial-of-Service attack can be performed by bombarding a server with connection


requests.
a. True
b. False

Answer: A

50. In a Layer 2 switch environment, for transmission control protocol (TCP) session
hijacking, users must be on a local area network (LAN) segment to see all
communications between client and server
A. True

B. False

Answer: A

51. Internet protocol (IP) and transmission control protocol (TCP) header information is
(generally) preserved between client and server with stateful filtering firewalls
A. True

B. False

Answer: A

52. Which has the flagsused for a TCP 3-way handshake?

A. Syn ->: Syn-Fin <-: Ack ->


B. Ack ->: Syn-Ack <-: Syn->
C. Syn ->: Syn-Ack <-: Ack->
D. Syn ->: Ack <-: Ack ->
Answer: C

53. ____ is when a layer 3 packet is modified to fit into a layer 2 network with different
characteristics.
A. Segmentation
B. Fragmentation
C. Reassembly
D. Packetization
54. Answer: B

55. What provides a physical connection between the network cabling and the computers
internal bus?
A. Switch
B. Hub
C. Router
D. Network interface card (NIC)
56. Answer: D

57. The connection points between the Network Layer and the Transport Layer is the IP
number(s) whereas the connection points between the Transport Layer and the upper
layers are called (Ports) which are represented by (16) bits in the TCP segment header.

58. The letter T in 10BaseT indicates that it is a twisted-pair cable.

59. In stop and wait flow control method receiver ACKs each data frame received. The
alternative to this is called sliding window.

60. CSMA stands for "Carrier Sense Multiple Access" which is standardized in IEEE 802.3

61. Ethernet or NIC addresses are 48 bit unique numbers used to identify physical devices in
CSMA/CD networks.

62. Full-Duplex transmission mode can be characterized simply as "two way simultaneous
transmission/reception".

63. Time To Live field in an IP packet determines the number of hops (routers) it passes
through before it is discarded.

64. In a router, what is the name of the structure that tells where to deliver IP-packets?
a) Router address b) Routing table c) Delivery table d) Status table e) Default entry table

65. Which of the following does not have a Data-Link Layer?


a) Router b) Gateway c) Switch d) Bridge e) Repeater
66.