You are on page 1of 39

1. A local area network is defined by………….

A)The geometric size of the network


B)The maximum number of hosts in the network
C)The maximum number of hosts in the network and/or the geometric size of the network
D)The topology of the network

2.The largest geographic area a wide area network can span is


A) A town
B) A state
C) A country
D) The world

3.The TCP/IP protocol suite consists of …………layers.


A)two
B) Three
C)four
D)five

4.A router is involved in …………layers of the TCP/IP protocol suite .


A)two
B) Three
C)four
D)five

5.A link layer switch is involved in ………………layers of the TCP/IP protocol suite
A)two
B)Three
C)four
D)five

6.In the TCP/IP protocol suite, which of the following is an application layer
protocol?
A)The User Datagram Protocol(UDP)
B)The Internet Protocol(IP)
C) The File Transfer Protocol(FTP)
D) The Transmission Control Protocol(TCP)
7.I n the TCP/IP protocol suite, which of the following is a transport layer protocol?
A) The Internet Control Message Protocol (ICMP)
B) The Internet Protocol(IP)
C) The Transmission Control Protocol (TCP)
D) The Address Resolution Protocol (ARP)

8. In the TCP/IP protocol suite, which of the following is a network layer protocol?
A) The Stream Control Transmission Protocol (STCP)
B) The Secure Shell (SSH)
C) The Internet Protocol (IP)
D) User Datagram Protocol (UDP)

9.In the TCP/IP protocol suite, the ……….layer is responsible for moving frames
from one hop to the next
A) Physical
B) Data link
C) Transport
D) Network

10. The transport layer packet in the TCP/IP protocol suite is called
A) A message
B) A datagram
C) A segment or a user datagram
D) A frame

11. In the TCP/IP protocol suite, the physical layer is concerned with the movement
of ……….over the physical medium.
A) Programs
B) Dialogs
C) Protocols
D) Bits
12. In the TCP/IP protocol suite, a port number is the identifier at the ………….
A) Application layer
B) Transport layer
C) Network layer
D) Physical layer

13. In the TCP/IP protocol suite, a logical address is the identifier at the…………..
A) Network layer
B) Transport layer
C) Data link layer
D) Application layer

14. The ………….layer is responsible for the delivery of a message from one process
to another
A) Physical
B) Transport
C) Network
D) Application

15. The Internet Protocol is……….protocol


A) A reliable
B) A connection oriented
C) A reliable and connection-oriented
D) An unreliable

16. The application layer in the TCP/IP protocol suite is usually considered to be the
combination of ……….layers in the OSI model
A) Application, Presentation, and Session
B) Application, Transport, and Network
C) Application, Data link, and Physical
D) Network, Data link, and Physical

17. A proposed standard is elevated to…………. standard status after at least two
successful tries
A) Informational
B) Historic
C) Draft
D) None of the above
18. An RFC is labeled ……………….if it must be implemented by all internet
systems
A) Required
B) Elective
C) Recommended
D) None of the above

19. In the original ARPANET…….…were directly connected to each other


A) Interface message processors (IMPs)
B) Host computers
C) Networks

20. ……………..was formed to connect universities with no defenses ties


A) ARPANET
B) CSNET
C) NSFNET
D) ANSNET

21. Currently ……..is responsible for the management of internet domain names
and addresses
A) NIC
B) ICANN
C) ISOC
D) IEFE

22. In the TCP/IP, a message at the application layer is encapsulated in a packet at


the ………layer
A) Network
B) Transport
C) Data link
D) Physical

23. In the TCP/IP, a message belonging to the transport layer is de-capsulated from
a packet at the…………layer
A) Network
B) Transport
C) Data link
D) Physical

24. In the TCP/IP, a message belonging to the network layer is de-capsulated from a
packet at the…………layer
A) Network
B) Transport
C) Data link
D) Physical

25. In the TCP/IP, a message belonging to the transport layer is de-capsulated from
a packet at the…………layer
A) Network
B) Transport
C) Data link
D) Physical

26. In TCP/IP, a logical connection between an entity at the network layer can be
made with another entity at the …………layer
A) Network
B) Transport
C) Data link
D) Physical

27. In TCP/IP, a logical connection between an entity at the network layer can be
made with another entity at the …………layer
A) Network
B) Transport
C) Data link
D) Physical

28. In TCP/IP, a packet at the third layer carries data belonging to the …………
layer and the header belonging to the ……………
A) Third; Third
B) Third: Fourth
C) Fourth;Fourth
D) Fourth; Third

29. In a client-server paradigm, a……….program provides services to


a……….program
A) Client; server
B) Client; client
C) Server; client
D) Server; server

30. The first section of a URL identifier is the………….


A) Protocol
B) Path
C) Host
D) Port

31. A ……….Document is a fixed-content document that is created and stored in a


server. The client can get a copy of the document only
A) Static
B) Dynamic
C) Active
D) None of the above

32………… is a language for creating a static document


A) Extensible Style Language(XSL)
B) Hypertext Markup Language (HTML)
C) Extensible Markup Language (XML)
D) All the above

33. A ………… document is created by a web server whenever a browser requests


the document
A) Static
B) Dynamic
C) Active
D) None of the above
34. For many applications, we need a program or a script to be run at the client site.
These are called……………documents
A) Static
B) Dynamic
C) Active
D) None of the above

35. HTTP uses the services of…………….


A) UDP
B) IP
C) TCP
D) DNS

36. FTP uses the services of ………………


A) UDP
B) IP
C) TCP
D) None of the above

37. In FTP….…well-known port(s) is (are) used


A) One
B) Two
C) Three
D) Four

38. During an FTP session the data connection may be opened…………..


A) Only once
B) Only two times
C) As many times as needed
D) None of the above

39. An e-mail message contains the……………and the…………


A) Header; envelop
B) Header; body
C) Envelop; body
D) None of the above

40. A port number is …………. Bits long


A) 16
B) 32
C) 64
D) 8

41. Which of the following dose UDP provide?


A) Flow control
B) Connection oriented delivery
C) Error control
D) None of the above

42.UDP packet are called……….


A) User datagram
B) Segments
C) Frames
D) None of the above

43. To use the services of UDP, we need…………socket addresses


A) Four
B) Two
C) Three
D) None of the above
44. TCP is a …………… protocol
A) Byte-oriented
B) Message-oriented
C) Block-oriented
D) None of the above

45. UDP packets have affixed-size header of……..bytes


A) 16
B) 8
C) 32
D) 40

46. TCP is a(n)………..protocol


A) Connection oriented
B) Connectionless
C) Both (A) & (B)
D) None of the above

47. Communication in TCP is ………..


A) Simplex
B) Half-duplex
C) Full-duplex
D) None of the above

48. Routers in the path are not allowed to………………..


A) Fragment the packet they receive
B) De-capsulate the packet
C) Change source or destination address
D) All the above

49. The performance of a network can be measured in terms of ……….


A) Delay
B) Throughput
C) Packet loss
D) All the above

50. The…………. Technique is one of the open loop congestion policy


A) Backpressure
B) Choke packet
C) Implicit signaling
D) None of the above

51. IP is a …………protocol
A) Connection oriented unreliable
B) Connection oriented reliable
C) Connectionless unreliable
D) Connectionless reliable

52. The IP header size is ……….bytes long


A) 20 to 60
B) 20
C) 60
D) None of the above

53. Packets in the IP layers are called……………


A) Segments
B) Datagrams
C) Frames
D) None of the above

54. The total length field defines the total length of the datagram………….
A) Including the header
B) Excluding the header
C) Excluding the option length
D) None of the above
55. In sub netting, the number of addresses in each subnet must……………
A) Be a power of 2
B) Be a multiple of 128
C) Be divisible by 128
D) None of the above

56. DHCP is a (an) ………….layer protocol


A) Application
B) Transport
C) Network
D) Data link
57. DHCP uses the services of …………..
A) UDP
B) TCP
C) IP
D) None of the above

58. Communication at the data link layer …………


A) End-to-end
B) Node-to-node
C) Process-to-process
D) None of the above

59. Which error detection method involves polynomials?


A) CRC
B) Simple parity check
C) Two-dimensional parity check
D) Checksum

60. Which error detection method consists of just one redundant bit per data unit?
A) Two-dimensional parity check
B) CRC
C) Simple parity check
D) Checksum

61. In cyclic redundancy checking, what forms the check bits?


A) The remainder
B) The divisor
C) The quotient
D) The dividend

62. HDLC is an acronym for………….


A) High-duplex line communication
B) Half-duplex link combination
C) High-level data link control
D) Host double level circuit
63. The shortest frame in HDLC protocol is usually the ………frame
A) Information
B) Management
C) Supervisory
D) None of the above

64. The HDLC ………….field defines the beginning and end of a frame
A) Control
B) Flag
C) FCS
D) None of the above

65. In the PPP frame, the …………field is for error control


A) FCS
B) Flag
C) Control
D) Protocol

66. In the ………….random access method collision is avoided


A) CSMA/CD
B) CSMA/CA
C) ALOHA
D) Token –passing

67. ………is a controlled-access protocol


A) FDMA
B) TDMA
C) CSMA
D) Reservation

68. …………is a channelization protocol


A) FDMA
B) TDMA
C) CDMA
D) All the above
69. An ARP reply is normally …………
A) Broadcast
B) Multicast
C) Unicast
D) None of the above

70. The minimum frame length for Ethernet is …………..bytes


A) 32
B) 80
C) 128
D)None of the above

71. Fast Ethernet has a data rate of …………


A) 10
B) 100
C) 1000
D) 10,000

72. Gigabit Ethernet has a data rate of…………


A) 10
B) 100
C) 1000
D) 10,000

73. Another name for cable TV office is the ……………


A) Splitter
B) Fiber node
C) Combiner
D) Head end

74. The HFC network uses …………cable


A) Twisted-pair
B) Coaxial
C) Fiber- optics
D) Combination of (B) & (C)
75. SONET uses ………..TDM multiplexing
A) Asynchronous
B) Synchronous
C) Statistical
D) None of the above

76. SONET system can use ……………


A) STS multiplexers
B) Regenerators
C) Add/drop multiplexers
D) All the above

77. SONET sends ………frames per second


A) 1000
B) 4000
C) 2000
D) 8000

78. The ATM standard defines………….layers


A) Two
B) Three
C) Four
D) Five

79. An ATM data unit is a cell composed of ……………bytes


A) 40
B) 50
C) 52
D) 53

80. A link layer switch is a connecting device that operates in the ………layers
A) Physical
B) Physical and data link
C) Data link and network
D) Physical, data link, and network
81. A router is a connecting device that operates in the………layers
A) Physical
B) Physical and data link
C) Data link and network
D) Physical, data link, and network

82. Transmission delay is the ratio of…………


A) Transmission rate to packet length
B) Transmission rate to distance
C) Packet length to transmission rate
D) Processing time to transmission rate

83. Propagation delay is the ratio of ……………


A) Transmission rate to propagation speed
B) Propagation speed to distance
C) Packet length to propagation speed
D) Distance to propagation speed
84. As frequency increases, the period ………….
A) Decreases
B) Increases
C) Remains the same
D) None of the above

85. …………is a type of transmission impairment in which the signal loses due to the
different propagation speeds of each frequency that makes up the signal
A) Attenuation
B) Distortion
C) Noise
D) Decibel

86. When propagation speed is multiplied by propagation time, we get


the……………
A) Throughput
B) Wavelength of the signal
C) Distortion factor
D) Distance a signal or bit has traveled

87. ……..can impair a signal


A) Bandwidth-period
B) Frequency-amplitude
C) Bandwidth-delay
D) Delay-amplitude

88. Polar and bipolar encoding are types of……………coding


A) Line
B) Block
C) Scrambling
D) None of the above

89. …………conversion involves three techniques: line coding, block coding, and
scrambling
A) Analog-to-digital
B) Digital-analog
C) Analog-to-analog
D) Digital-to-digital

90. Which of the following is not a chord interface?


A) Lookup
B) Fix node
C) Stabilize
D) Join

91. The finger table is the routing table used in ……….


A) Gnutella
B) Pastry
C) Kademlia
D) None of the above

92. DNS can be the service of…………….


A) UDP
B) TCP
C) Either UDP or TCP
D) None of the above

93. In……………….resolution, the resolver expects the server to supply the final
answer
A) Iterative
B) Recursive
C) Straight
D) None of the above
94. A route of DNS tree is …………..
A) A string of 127 characters
B) A string of 63 characters
C) A string of 15 characters
D) An empty string

95. SMTP is a………………protocol


A) Pull
B) Push
C) Push and pull
D) None of the above

96. The message access protocol is a………protocol


A) Pull
B) Push
C) Push and pull
D) None of the above

97. TELNET is an abbreviation for…………….


A) Terminal network
B) Telephone network
C) Telecommunication network
D) None of the above

98. When a user logs into a local time-sharing system it is called ……….login
A) Local
B) Remote
C) Local or remote
D) None of the above

99. The ………translates the local characters into NVT characters


A) Terminal driver
B) TELNET client
C) TELNET server
D) Pseudo terminal driver

100. In TCP ………………….retransmission timer is set for an ACK segment


A) One
B) Two
C) Three
D) None of the above

101. Baseband transmission of a digital signal is possible only if we have a


………..channel
A) Low-pass
B) Band -pass
C) Low rate
D) High rate

102. If the available channel is a……………channel we cannot send a digital signal


directly to the channel
A) Low-pass
B) Band -pass
C) Low rate
D) High rate

103. Trackless Bit Torrent uses……………DHT to do the job of tracking


A) Chord
B) Pastry
C) Kademlia
D) None of the above

104. In kademlia each node in the network divides the binary tree into m sub-trees
that
A) Include the node itself
B) Do not include the node itself
C) Include the node itself and the successor node
D) None of the above
105. I n …………nodes and data items are m-bit identifiers that create an identifier
space of 2m points distributed at the leaves of a binary tree
A) Chord
B) Pastry
C) Kademlia
D) None of the above

106. In kademlia the distance between the two identifiers are measured as the bit-
wise…………..between them
A) AND
B) OR
C) NOR
D) None of the above

107. To solve a query………….uses two entities a routing table and a leaf set
A) Chord
B) Pastry
C) Kademlia
D) None of the above

108. In ……………a key is stored in a node whose identifier is numerically closest to


the key
A) Chord
B) Pastry
C) Karelia
D) None of the above

109. In a DHT-based network each peer


A) Has a partial knowledge about the whole network
B) Has a complete knowledge about the whole network
C) Only has a knowledge about its successor
D) None of the above

110. In a structured-decentralized P2P network………………….


A) The directory system is kept in a center
B) A query to find a file must be flooded through the network
C) A pre-defined set of rules is used to link nodes so that a query can be effectively and
efficiency resolved
D) None of the above

111. In a centralized P2P network the directory system uses the …………paradigm;
the storing and downloading of the files are done using ………………paradigm
A) Client-Server; Client-Server
B) Peer- to-Peer; Client-Server
C) Client-Server; Peer-to-Peer
D) Peer-to-Peer; Peer-to-Peer

112. A register a commercial entity accredited by …………is responsible for adding


new domains to DNS database
A) NIC
B) ICANN
C) ISOC
D) IEFE

113. In the internet the country domain section uses…………..country


abbreviations
A) Two-characters
B) Three-characters
C) Four-characters
D) None of the above

114. A……………server is a computer that transfer the complete information about


a zone from another server
A) Primary
B) Secondary
C) Zone
D) Root

115. A……………..server is a computer that stores a file about the zone for which it
has an authority
A) Primary
B) Secondary
C) Zone
D) Root

116. A ………….server is a computer whose zone system consists of the whole tree
A) Domain
B) Zone
C) Root
D) Primary

117. In the domain name space what a server is responsible for or has authority over
is called a………….
A) Domain
B) Label
C) Zone
D) None of the above

118. In the domain name space a …………….is a sub-tree of the domain name space
A) Domain
B) Label
C) Zone
D) None of the above

119. In the domain name space if a label is not terminated by a null, it is called a
……………
A) FQDN
B) PQDN
C) SQDN
D) None of the above

120. In the domain name space if a label is terminated by a null, it is called


a…………..
A) FQDN
B) PQDN
C) SQDN
D) None of the above

121.In datagram subnet new route is chosen…………………


(A)For every packets ent
(B)For all the packet sent
(C) Only for the first packet
(D) For the packet which is not transmitted

122.The PSTN is an example of a…………………network.


(A)Packet switched
(B) Circuit switched
(C) Message switched
(D) None of these

123.Each packet is routed independently in……………….


(A)Virtual circuit subnet
(B)Short circuit subnet
(C) Datagram subnet
(D) ATM subnet

124.Which type of switching uses the entire capacity of a dedicated link?


(A)Circuit switching
(B) Datagram packet switching
(C) Virtual circuit packet switching
(D) Message switching

125.In……………circuit switching, delivery of data is delayed because data must be


stored and retrieved from RAM.
(A)Space division
(B)Time division
(C) Virtual
(D) None of the above

126.In…………….,each packet of a message need not follow the same path from
sender to receiver
(A)Circuit switching
(B)Message switching
(C) Virtual approach to packet switching
(D) Datagram approach to packet switching

127.In………………,each packet of a message follows the same path from sender to


receiver.
(A)Circuits witching
(B)Message switching
(C) Virtual approach to packet switching
(D) Datagram approach to packet switching

128.A permanent virtual circuit involves……………..


(A)Connection establishment
(B)Data transfer
(C) Connection release
(D) Connection check

129.Computer Network is
A)Collection of hardware components and computers
B) Interconnected by communication channels
C) Sharing of resources and information
D)Allofthe Above
130. What is a Firewall in Computer Network?
A)The physical boundary of Network
B)An operating System of Computer Network
C)A system designed to prevent unauthorized access
D)A web browsing Software

131.How many layers does OSI Reference Model has?


A) 4
B) 5
C) 6
D) 7

131. DHCP is the abbreviation of


A) Dynamic Host Control Protocol
B) Dynamic Host Configuration Protocol
C) Dynamic Hyper Control Protocol
D) Dynamic Hyper Configuration Protocol

132.IPV4 Address is
A) 8 bit
B) 16 bit
C) 32 bit
D) 64 bit

133.DNS is the abbreviation of


A) Dynamic Name System
B) Dynamic Network System
C) Domain Name System
D) Domain Network Service
134. What is the meaning of Bandwidth in Network?
A) Transmission capacity of a communication channels
B) Connected Computers in the Network
C) Class of IP used in Network
D) None of Above

135. ADSL is the abbreviation of


A) Asymmetric Dual Subscriber Line
B)Asymmetric Digital System Line
C)Asymmetric Dual System Line
D) Asymmetric Digital Subscriber Line

136. What is the use of Bridge in Network?


A) To connect LANs
B) To separate LANs
C) To control Network Speed
D) All of the above

137. Router operates in which layer of OSI Reference Model?


A) Layer1 (Physical Layer)
B) Layer3 (Network Layer)
C) Layer4 (Transport Layer)
D) Layer7 (Application Layer)

138. Each IP packet must contain


A) Only Source address
B) Only Destination address
C) Source and Destination address
D) Source or Destination address

139. Bridgeworks in which layer of the OSI model?


A) Application
layer
B) Transport layer
C) Network layer
D) Data-link layer
140. Provides a connection-oriented reliable service for sending
messages
A) TCP
B) IP
C) UDP
D) All of the above

141. Which layers of the OSI model are host-to-host layers?


A. Transport, Session, Presentation, Application
B. Network, Transport, Session, Presentation
C. Data-link, Network, Transport, Session
D. Physical, Data-link, Network, Transport

142. Which of the following IP address class is Multicast?


A. ClassA
B. ClassB
C. Class C
D. ClassD

143. Which of the following is correct regarding Class B Address


of IP address
A) Network bit –14, Host bit –16
B) Network bit – 16, Host bit– 14
C) Network bit – 18, Host bit– 16
D) Network bit –12, Host bit –14

144. The last address of IP address represents


A) Unicast address
B) Network address
C) Broadcast address
D) None of above

145. How many bits are there in the Ethernet address?


A) 64bits
B) 48 bits
C) 32 bits
D) 16 bits

146. How many layers are in the TCP/IP model?


A) 4layers
B) 5layers
C) 6layers
D) 7layers

147. Which of the following layer of OSI model also called end-to-end
layer?
A) Presentation layer
B) Network layer
C) Session layer
D) Transport layer

148. Why IP Protocol is considered as unreliable?


A.A packet may be lost
B. Packets may arrive out of order
C. Duplicate packets maybe generated
D. All of the above

149. What is the minimum header size of an IP packet?


A. 16 bytes
B.10bytes
C. 20bytes
D.32bytes

150. Which of following provides reliable communication?


A.TCP
B.IP
C.UDP
D. All of the above
151. What is the address size of IPv6?
A.32bit
B.64 bit
C. 128bit
D.256bit

152. What is the size of Network bits & Host bits of Class A of IP
address?
A. Network bits 7, Host bits 24
B. Network bits 8, Host bits24
C. Network bits 7, Host bits23
D. Network bits 8, Host bits 23

153. What does Router do in a network?


A. Forwards a packet to all outgoing links
B. Forwards a packet to the next free outgoing link
C. Determines on which outing link a packet is to be forwarded
D. Forwards a packet to all outgoing links except the originated link

154. The Internet is an example of


A. Cell switched network
B. circuit switched network
C. Packet switched network
D. All of above

155. What does protocol defines?


A. Protocol defines what data is communicated.
B. Protocol defines how data is communicated.
C. Protocol defines when data is communicated.
D. All of above
156. What is the use of sub-netting?
A. It divides one large network into several smaller ones
B. It divides network into network classes
C. It speeds up the speed of network
D. None of above

157. Repeater operates in which layer of the OSI model?


A. Physical layer
B. Data link layer
C. Network layer
D) Transport layer

158. If all devices are connected to a central hub, then topology is


called
A) Bus Topology
B) Ring Topology
C) Star Topology
D) Tree Topology

159. Which of the following is an application layer service?


A) Network virtual terminal
B) File transfer, access and management
C) Mail service
D) All the above

159. Which is the main function of transport layer?


A) Node to node delivery
B) End to end delivery
C) Synchronization
d) Updating and maintaining routing tables
160. The............layer change bits on to electromagnetic signals.
A) Physical
B) Data-link
C) Transport
D) Presentation

161. In mesh topology, relationship between one device and another is..............
A) Primary to peer
B) Peer to primary
C) Primary to secondary
D) Peer to Peer

162. The performance of data communications network depends on..............


A) Number of users
B) The hardware and software
C) The transmission
D) All the above

163. Find out the OSI layer, which performs token management.
A) Network Layer
B) Transport Layer
C) Session Layer
D) Presentation Layer

164. The name of the protocol which provides virtual terminal in TCP/IP model is.
A) Telnet
B) SMTP
C) HTTP

165. The layer one of the OSI model is


A) Physicallayer
B) Link layer
C) Router layer
D) Broadcast layer

166. What is the name of the network topology in which there are bi-directional
links between each possible node?
A) Ring
B) Star
C) Tree
D) Mesh
167. What is the commonly used unit for measuring the speed of data
transmission?
A)Bytes per second
B)Baud
C) Bit per second
D) Both B & C

168. A network that needs human beings to manually route signals is called....
A) Fiber Optic Network
B) Bus Network
C) T-switched network
D) Ring network

169. TCP/IP................. Layer corresponds to the OSI models to three layers.


A) Application
B) Presentation
C) Session
D) Transport

170.Whichofthetransportlayerprotocolsis connectionless?
A) UDP
B) TCP
C) FTP
D) Nvt

171. Which of the following applications allows a user to access and change
remote files without actual Transfer?
A) DNS
B) FTP
C) NFS
D) Telnet

172.The data unit in the TCP/IP layer called a.....


A) Message
B) Segment
C) Datagram
D) Frame

173. DNS can obtain the................. Of host if its domain name is known and vice
versa.
A) Station address
B) IP address
C) Port address
D) Checksum

174. Which of the following OSI layers correspond to TCP/IP's application layer?
A) Application
B) IP Address
C) Session
D) All of the above
175. Devices on one network can communicate with devices on another network via
a.......
A) File Server
B) Utility Server
C) Printer Server
D) Gateway

176. A communication device that combines transmissions from several I/O devices
into one line is a
A) Concentrator
B) Modifier
C) Multiplexer
D) Full duplex file

177. Which layers of the OSI determines the interface often system with the user?
A) Network
B) Application
C) Data link
D) Session

178. Which of the following of the TCP/IP protocols is used for transferring files
from one machine to another?
A) FTP
B) SMTP
C) SNMP
D) Rpe

179. In which OSI layers does the FDDI protocol operate?


A) Physical
B) Data link
C) Network
D) A and B

180. In FDDI, data normally travel on..................


A) The primary ring
B) The Secondary ring
C) Both rings
D) Neither ring

181. The............layer of OSI model can use the trailer of the frame for error
detection.
A) Physical
B) Datalink
C) Transport
D) Presentation

182. In a................topology, if there are n devices in a network, each device has n-1
ports for cables.
A) Mesh
B) Star
C) Bus
D) Ring

183. Another name for Usenet is


A) Gopher
B) Newsgroups
C) Browser
D) CERN
184. The standard suit of protocols used by the Internet, Intranets, extranets and
some other networks.
A) TCP/IP
B) Protocol
C) Open system
D) Internet work processor

185. State whether the following is true or false.


i) In bus topology, heavy Network traffics lows down the bus speed.
ii) It is multipoint configuration.
A) True, True
B) True, False
C) False, True
D) False, False

186. Which of the following is the logical topology?


A) Bus
B) Tree
C) Star
D) Both A and B

187. Which of the following is/are the drawbacks of Ring Topology?


A) Failure of one computer, can affect the whole network
B) Adding or removing the computers disturbs the network activity
C) If the central hub fails, the whole network fails to operate.
D) Both of A and B

188. Which of the following protocol is/are defined in Transport layer?


A) FTP
B) TCP
C) UDP
D) B&C
189. ISO stands for
A) International Organization for standardization
B) Internet Organization for standardization
C) International Organization for standardization
D) International for Organization standardization

190.TCP/IP model is the…………which is used in the OSI model


A) Oldest protocol
B) Not so old protocol
C) Newly established protocol
D) None of the above

191. Which one of the following is an architecture paradigm?


a) Peer to peer
b) Client-server
c) HTTP
d) Both Peer-to-Peer & Client-Server

192. E-mail is _________


a) Loss-tolerant application
b) Bandwidth-sensitive application
c) Elastic application
d) None of the mentioned

193. Pick the odd one out.


a) File transfer
b) File download
c) E-mail
d) Interactive games
194. Which of the following is an application layer service?
a) Network virtual terminal
b) File transfer, access, and management
c) Mail service
d) all of the mentioned

195. To deliver a message to the correct application program running on a host, the
_______ address must be consulted.
a) IP
b) MAC
c) Port
d) none of the mentioned

196. Which is a time-sensitive service?


a) File transfer
b) File download
c) E-mail
d) Internet telephony

197. Transport services available to applications in one or another form _________


a) Reliable data transfer
b) Timing
c) Security
d) All of the mentioned

198. Electronic mail uses which Application layer protocol?


a) SMTP
b) HTTP
c) FTP
d) SIP

199. Which is not a application layer protocol?


a) HTTP
b) SMTP
c) FTP
d) TCP

200. The packet of information at the application layer is called __________


a) Packet
b) Message
c) Segment
d) Frame

You might also like