1. What is Availability?
Ans. it ensure that system work promptly and service is not denied to authorized users.
2. PAN stands for _________
a) Personal area network
b) Prompt area network
c) Private area network
d) Pear area network
Ans. A
3. LAN stands for_______
a) Local Area network
b) Line area network
c) live area network
d) Long area network
Ans. A
4. CAN stands for _______
a) Campus area network
b) College area network
c) Center area network
d) Close area network
Ans. A
5. WAN stands for _______
a) wide area network
b) wireless area network
c) wast area network
d) work area network
Ans. A
6. GAN stands for__________
a) Global area network
b) Ground area network
c) Gold area network
d) Globe access network
Ans. A
7. ISP stands for_______.
a) Internet service provider
b) Indian special police
c) International service provider
d) Inspiration
Ans. A
8. IPS stands for _______.
a) IN plane switching
b) Instructions Per second
c) Indian police service
d) Both a and b Ans.
D 9. NTP stands for _______.
a) Network time protocol
b) New terminal Point
c) Network time policy
d) Network term policy
Ans. A
10. SMS stands for________.
a) Short message service
b) Small message service
c) special message service
d) short module set
Ans. A
11. SMTP stands for ________.
a) Simple mail transfer protocol
b) Short message transfer protocol
c) Small message test protocol
d) super message test protocol
Ans. A
12. TCP stands for _____.
a) transmission control protocol
b) time control protocol
c) total control protocol
d) transmission circuit protocol
Ans. A
13. TN stands for _______.
a) twisted nematic
b) total number
c) trial network
d) traffic network
Ans. A
14. URL stands for _______.
a) Union resource locator
b) Uniform resource locator
c) Union relay light
d) Under relay light
Ans. B
15. NTP stands for _________.
a) Network time protocol
b) New time protocol
c) network threat protocol
d) network term policy
Ans. A
16. www stands for __________.
a) world wide web
b) whole world web
c) world wide wire
d) weird world web
Ans. A
17. The protocol used to automatically assign IP address to a newly connected host in a network is called ______.
(a) Dynamic Host Configuration Protocol (DHCP)
(b) Transmission Control Protocol (TCP)
(c) User Datagram Protocol (UDP)
(d) File Transfer Protocol (FTP)
Ans. a
18. Third generation of firewall offers_____ to prevent web fingerprint attacks.
(a) web application firewall
(b) packet filter
(c) stateful filter
(d) none of them
Ans. a
19. Who invent www ?
a) bob kahn
b) Tim berners lee
c) vint cerf
d) lady ada lovelace
Ans. B
20. WWW invent in the year__________.
a) 1989
b) 1984
c) 1999
d) 1985
Ans. A
21. TLD stands for_________.
a) time limit domain
b) top level domain
c) try low level domain
d) tata limited department
Ans. B
22. URL stands for________.
a) user relation line
b) uniform resource locator
c) union relay line
d) user roll lime
Ans. B
23. “.com” domain definition is ________.
a) government
b) education
c) commercial
d) international
Ans. C
24. DNS stands for ________.
a) digital name system
b) domain name system
c) direct name system
d) digital name subscribe
Ans. B
25. communication means_________.
a) sending or receiving information
b) sending information
c) receiving information
d) none of these
Ans. A
26. The identity management system binds logical addresses to ______for reputed servers.
(a) MAC address
(b) specific programs
(c) other computers
(d) none of them
Ans. a
27. Exchange of data between two devices using some form of transmission media is called _________. a) technology
b) data communication
c) recording
d) tracking
Ans. B
28. IPS in firewall stands for ______.
(a) Intrusion Protection System
(b) Intrusion Prevention Software
(c) Internet Prevention System
(d) Intrusion Prevention System
Ans. d
29. when data can transfer both side but at a time only one direction can send information is called_______.
a) Half duplex
b) simplex
c) full duplex
d) communication
Ans. A
30. when data can transfer both side same time data transmission is called _________.
a) Half duplex
b) simplex
c) full duplex
d) communication
Ans. C
31. Telnet stands for_________.
a) Telecommunication network
b) telephone net
c) tele net
d) tele network
Ans. A
32. NFS stands for__________.
a) new file system
b) network file system
c) new file storage
d) need file storage
Ans. B
33. NAS stands for _______.
a) network attached storage
b) network access storage
c) network activity sport
d) new active system
Ans. A
34.Third generation firewalls were otherwise called______ .
(a) packet filters
(b) stateful filters
(c) application filters
(d) none of them
Ans. c
35. SSH stands for __________.
a) secure socket shell
b) secure shell
c) both A and B
d) secure session hall
Ans. C
36. NETBIOS stands for___________.
a) network basic input output system
b) network bill open
c) network basic inter os
d) network bulls
Ans. A
37. RPC stands for_______.
a) relay point company
b) remote procedure call
c) right police company
d) ray privacy
Ans. B
38. UDP stands for_________.
a) user datagram protocol
b) uniq data protocol
c) user diagram protocol
d) user data policy
Ans. A
39. IPSEC stands for__________.
a) input second
b) IP security
c) input secondry
d) inline point section
Ans. B
40. IETF stands for___________.
a) internet engineering task force
b) internet force
c) intel telephone
d) intex phone
Ans. A
41. IGMP stands for____________.
a) internet group management protocol
b) instagram mp
c) instagram photo
d) ig map
Ans. A
42. PPP stands for_________.
a) personal private place
b) public private partnership
c) pear private policy
d) pure policy protocol
Ans. B
43. Fiber optic cable are made by______.
a) copper
b) plastic
c) glass
d) Both B and C
Ans. D
44. __________is a physical arrangement of all computers.
a) setting
b) topology
c) network
d) satellite
Ans. B
45. Topology is also called ________.
a) network b) bus
c) network architecture
d) wire setting
Ans. C
46.Second generation firewalls were otherwise called______ .
(a) packet filters
(b) stateful filters
(c) application filters
(d) none of them
Ans. b
47. In _______ topology , all computers are connected in a loop or circle via cable.
a) tree
b) hybrid
c) ring
d) bus
Ans. C
48. First generation firewalls were otherwise called ______.
(a) packet filters
(b) stateful filters
(c) application filters
(d) none of them
Ans. a
49. _________topology is a mixture of two or more than 2 topology.
a) tree
b) hybrid
c) ring
d) bus
Ans. B
50. How many layers in OSI model ?
a) 5
b) 4
c) 9
d) 7
Ans. D
51. OSI stands for_________.
a) open system interconnection
b) operation information
c) open system
d) only system
Ans. a
52.Third general firewalls operated at layer _______of the OSI model.
(a) 3
(b) 4
(c) 5
(d) 7
Ans. d
53. ISO stands for__________.
a) international organization of standardization
b) inter service organization
c) intel service organization
d) inner service option
Ans.
54. Network communication protocols are based on the standards of ________.
a) app model
b) OSI model
c) ISO model
d) Heetson model
Ans. b
55. FTP stands for_________.
a) file transfer protocol
b) file total protect
c) file tip policy
d) fully tight policy
Ans. a
56. HTTP stands for________.
a) high text transfer protocol
b) hyper text transfer protocol
c) higher text transfer policy
d) none of these Ans. b
57. DHCP stands for_________.
a) dynamic host configuration protocol
b) dynamic host cup policy
c) double host copy policy
d) double host configuration protocol
Ans. a
58. ASCII stands for_________.
a) american social company information
b) American standard code for information interchange
c) apple socity code interchange policy
d) American state code for information interchange
Ans. b
59. CORE of the OSI model is known as __________.
a) network layer b) transport layer
c) datalink layer
d) application layer
Ans. b
60. ICMP stands for___________.
a) internet control message protocol
b) inter company money policy
c) interconnection money policy
d) international color management protocol
Ans. a
61. MAC stands for__________.
a) money access control
b) media access control
c) media access company
d) more archery corp.
Ans. b
62. Transmission of data rate decided by ___________
a) network layer
b) transport layer
c)physical layer
d) application layer
Ans. c
63. POP-3 stands for__________.
a) post office protocol
b) private office protocol
c) post office policy
d) private office policy
Ans. a
64. BGP stands for__________.
a) boarder gateway policy
b) boarder gateway protocol
c) broadway gateway protocol
d) both B and C
Ans. d
65. SNMP stands for______________.
a) simple network management protocol
b) simple network model protocol
c) simple network module policy
d) simple network model policy
Ans. a
66. RIP stands for__________.
a) relay info. Policy
b) routing information protocol
c) routing inter protocol
d) route in policy
Ans. b
67. OSPF stands for____________.
a) open system path first
b) OS protocol firm
c) OS policy first
d) open policy file
Ans. a
68. NOS stands for__________.
a) Network open system
b) network operating system
c) national open system
d) new oriented policy
Ans. b
69. UUCP stands for__________.
a) Unix to Unix copy protocol
b) Union corporation
c) union corporation policy
d) unix to unix protocol
Ans. a
70. NNTP stands for__________.
a) Network news transfer protocol
b) network news transfer policy
c) network news term policy
d) network news terminal policy
Ans. a
71. C-DOT stands for__________.
a) center of dot
b) center for development of telematics
c) center digital technology
d) none of these
Ans. b
72. ISH stands for__________.
a) Information super highway
b) indian super highway
c) international highway
d) Italy highway
Ans. a
73. NICNET stands for__________.
a) national information network
b) national information center network
c) news network
d) nice network
Ans. b
74. At the _____ layer the data unit is transformed into the corresponding electromagnetic signal.
a) application
b) network
c) physical
d) data link
Ans. c
75. The ________ layer oversees the delivery of a data unit between two systems on different networks.
a) application
b) network
c) physical
d) data link
Ans. b
76. _________ layer provide a mechanism to route packets from network to network.
a) application
b) network
c) physical
d) data link
Ans. b
77. ______ layer is responsible for removing the network layer header as the data unit moves to the transport layer.
a) application
b) network
c) physical
d) data link
Ans. b
78. _______layer may create a connection ( a single logical path between the source and destination that is associated with all the packets of a message) between two end ports.
a) transport
b) network
c) physical
d) data link
Ans. a
79. Network virtual terminal is a service of ________ layer.
a) application
b) network
c) physical
d) data link
Ans. a
80. Modem is required for the__________.
a) data communication
b) internet connection
c) phone calls
d) routing
Ans. b
81. The process of Transferring files from a computer on the internet to your computer is called________.
a) Uploading
b) Sending
c) Downloading
d) Sharing
Ans. c
82. VOIP stands for_________.
a) voice over IP
b) Voice I pad
c) Voice Pad
d) Voice input Processing
Ans. a
83. _____is an error reporting protocol.
a) IGMP
b) ICMP
c) Mail slot
d) TCP
Ans. b
84. Group of electrical wires used to send data between two or more components. Provide transportation of data.
a) Data bus
b) Topology
c) Wired board
d)PCB
Ans. a
85. _________ is used to specify a physical address.
a) Address Bus
b) Physical layer
c) PCB
d) Address pointer
Ans. a
86. Second general firewalls operated at layer______ of the OSI model.
(a) 3
(b) 4
(c) 5
(d) 7
Ans. b
87. ______ are computers that provide resources to other computers to a : Mainframe computer Ans. Servers 88. First general firewalls operated at layer______ of the OSI model.
(a) 3
(b) 4
(c) 5
(d) 7
Ans. a
89. The set of layer‟s and Protocols is known as ______. Ans. Network Architecture 90. The WAN‟s are also referred to as _______ Network.
Ans. Long Haul
91. Data rate high in ______ then WAN.
Ans. LAN
92. Protocol is a set of Forma Operating ______.
Ans. Rules
93. Video conferencing is also called ________. Ans. Teleconferencing 94. One way broadcast are called ______
Ans. Cybercast
95. When the baud/bit rate is higher the character are transmitted _______.
Ans. Faster
96. Baud is a Measure of Speed of _______.
Ans. Modem
97. Keyboard work on _______ communication mode.
Ans. simplex
98. Bluetooth work on________ communication mode.
Ans. Half Duplex
99. What is Broadcasting?
Ans. Broadcasting is the Process of sending data Packets to multiple recipient all at once. Ex: Radio, Live TV show
100. Filtering connections and disallowing prohibited connections is carried out using ______.
(a) MODEM
(b) router
(c) firewall
(d) bridge
Ans. c
101. What is the delay that occur during the Playback of a stream known as _____.
Ans. Jitter
102. To create the last end of fiber optical cable ______ is mostly used.
Ans. Glass
103. The Transmission used in network is called_____.
Ans. Channel
104. To create network of networks_____ Developed
Ans. IP
105. _____ topology of network is a Passive topology.
Ans. Bus
106. In twisted pair cable one wire interfering with another wire is called ______.
Ans. Cross talk
107. Server operates on _______
Ans. Client/Server Architecture
108. _____ Protocol supports both online and offline retrieval of email.
Ans. IMAP
109. A list of Protocols used by a system, one protocol per layer is called:
Ans. Protocol suit
110. Coaxial cables have conducted with _______.
Ans. Common Axis
111. Bridge works in ______ layer.
Ans. Transport
112. _____ helps in remote login.
Ans. FTP
113. Connection to the Internet requires enforcement of______ security.
(a) low
(b) high
(c) zero
(d) no
Ans. b
114. IPV6 is an _____ address whose binary bits are separated by a colon.
Ans. Alphanumeric
115. _____ is a text based computer Protocol Ans. Telnet 116. Topology where every node is connected to two other nodes is ____ topology. Ans. Ring P a g e | 254
117. An HTTP request contains ____ Parts. Ans. 3
118.Which layer in OSI model performs network routing, flow control and error control function?
A. Network layer
B. Session layer
C. Physical layer
D. Data link layer
Ans. a
119.What is the full form of IP?
A. internet protect
B. intranet protocol
C. internet protocol
D. international protocol
Ans. c
120.What is the full form of TCP?
A. Test Control Protocol
B. Transfer Control Protocol
C. Transport Control Protocol
D. Transmission Control Protocol
Ans. d
121.Which layer is the layer 2 in OSI network model?
A. Session lay
b. Physical layer
C. Data link layer
D. Transport layer
Ans. c
122.Which layer is the layer 4 in OSI model?
A. Session layer
B. Network layer
C. Data link layer
D. Transport layer
Ans. d
123.Which is the 6th layer in OSI communication model?
A. Session layer
B. Network layer
C. Application layer
D. Presentation layer
Ans. d
124.What is the abbreviation of OSI?
A. Open Source Internet
B. Open System Interaction
C. Open Source Interconnection
D. Open System Interconnection
Ans. d
125.What is the full form of EFT?
A. Electronic Form Transfer
B. Electronic Fund Transfer
C. Electronic Field Transfer
D. Electronic Format Transfer
Ans. b
P a g e | 255
126.Which is an example for WAN?
A. Ethernet
B. Home network
C. Campus network
D. Bluetooth network
Ans. a
127.What is the full form of ADSL?
A. Asymmetrical Digital System Line
B. Automatic Digital Subscriber Line
C. Asymmetrical Digital Subscriber Line
D. Asynchronous Digital Subscriber Line
Ans. c
128.Which is the layer 3 in OSI model?
A. Network layer
B. Session layer
C. Physical layer
D. Data link layer
Ans. a
129.Which is a reference tool for understanding data communication between any two network system?
A. LAN
B. WAN
C. ISO model
D. OSI model
Ans. d
130.What is called the interconnected computer systems located at different places?
A. internet
B. computer layout
C. computer network
D. connectivity of computer
Ans. c
131.Which topology combines characteristics of linear bus and star topologies?
A. Bus
B. Star
C. Tree
D. Mesh
Ans. c
132.How many pairs of wires contains in category 5 UTP cable?
A. 3
B. 4
C. 5
D. 6
Ans. b
133.What is the maximum speed supported by category 5 UTP cable?
A. 1mbps
B. 10mbps
.C 100mbps
D. 1000mbps
Ans. c
P a g e | 256
134. The address 2001:db8:a0b:12f0::1 is formatted in _____.
(a) IPV0
(b) IPV2
(c) IPV4
(d) IPV6
Ans. d
135.Which device is installed in a subscriber‟s telephone line to allow both ADSl and regular voice (telephone) services to be used at the same time?
A. Hub
B. Switch
C. MODEM
D. Micro filter
Ans. d
136.Which layer of OSI Model, transfer data between network entities?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
Ans. d
137.Which device connects multiple network segments along with the data link layer?
A. Hub
B. Bridge
C. Router
D. Switch
Ans. b
138.Which device is used to amplify or regenerate digital signals received while sending them from one port of a network into another?
A. Hub
B. Bridge
C. Switch
D. Repeater
Ans. d
139.Which device modulates analog signal to encode digital information and demodulates carrier signal to decode the transmitted information over the telephone network?
A. Hub
B. Bridge
C. Switch
D. MODEM
Ans. d
140.Which device is used to connect one network with another network that uses different protocols?
A. Hub
B. Router
C. Switch
D. Gateway
Ans. d
141.Which device forwards data packet between computer network?
A. Hub
B. Router
C. Switch
D. Gateway
Ans. b
P a g e | 257
142.What is the speed of standard 10 base T cable?
A. 1 mbps
B. 10 mbps
C. 100 kbps
D. 100 mbps
Ans. b
143.Which type of cable is used in 10 base-FL cable standard?
A. UTP
B. STP
C. Co-axial
D. Fibre optic
Ans. d
144.What is the speed of 100BASE-TX cable?
A. 1 mbps
B. 10 mbps
C. 100 kbps
D. 100 mbps
Ans. c
145. Which is the standard connector for category-5, unshielded twisted pair cabling?
A. RJ11
B. RJ14
C. RJ25
D. RJ45
Ans. d
146.How many pairs of wires are there in category 1 UTP cables?
A. 1
B. 2
C. 3
D. 4
Ans. a
147.Which is an application layer of internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection?
A. IP
B. FTP
C. UDP
D. POP
Ans. d
148.Which layer in OSI model provides transfer the data between end users?
A. Session layer
B. Network layer
C. Data link layer
D. Transport layer
Ans. d
149.What is the purpose of the last three layers in OSI model?
A. common application services
B. data presentation within the end-user system
C. passing traffic through the network to an end system
D. manage the dialogue between end user application process
Ans. c
150.Which layers of OSI model is the router operate?
A. Layer 2
B. Layer 3
C. Layer 6
D. Layer 7
Ans. b
P a g e | 258
151.Which layer of OSI network model does repeater works?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
Ans. a
152.Which is a standard network protocol used to transfer files from one host or to another host over a TCP based network, such as the internet?
A. FTP
B. TCP
C. UDP
D. SMTP
Ans. a
153.Which is a network protocol used on the internet or LAN to provide a bi-directional interactive text oriented communication facility using a virtual terminal connection?
A. FTP
B. TCP
C. UDP
D. Telnet
Ans. d
154. Connecting several computers and devices using wired or wireless technology is called _____.
(a) hard disk
(b) RAM
(c) pen drive
(d) networking
Ans. d
155. Internet is constituted of _______ .
(a) network of networks
(b) hard disk
(c) DVD
(d) pen drive
Ans. a
156. Computers and devices can be connected using __________ technology to create a network.
(a) wired
(b) wireless
(c) both a & b
(d) neither a nor b
Ans. c
157. The procedure used by computers connected in a network for data exchange is called network .
(a) topology
(b) protocol
(c) firewall
(d) antivirus
Ans. b
158. The computer which separates a local network from external Internet is called network ______ .
(a) topology
(b) protocol
(c) firewall
(d) antivirus
Ans. c
159. The piece of software which prevents malicious software from entering a computer is called network ______.
(a) topology
(b) protocol
(c) firewall
(d) antivirus
Ans. d
160. Most of the wired network connections use_____ .
(a) Optical Fibre Cable (OFC)
(b) USB cable
(c) pen drive
(d) hard drive
Ans. A
P a g e | 259
161. The port for connecting broadband cable to a computer is called ______.
(a) ethernet port
(b) Registered Jack 45 (RJ-45)
(c) both a & b
(d) none of them
Ans. c
162. Wireless network connections use ______technologies.
(a) Wireless Fidelity (WiFi)
(b) Bluetooth
(c) both a & b
(d) neither a nor b
Ans. c
163. _______ are the hardware devices that help the computer to connect to a network.
(a) Routers
(b) MODEMs
(c) Wireless MODEMs
(d) all of them
Ans. d
164. MODEM stands for _______.
(a) MODulation DEMocracy
(b) MODulation DEModulation
(c) MODern DEModulation
(d) MODerate DEModulation
Ans. b
165. Routers help in _______.
(a) transmission of data between networks
(b) connecting different devices using appropriate protocol
(c) both a & b
(d) neither a nor b
Ans. c
166. A network connection requires ________ important components to connect to each other.
(a) IP address
(b) Port number
(c) both a & b
(d) none of them
Ans. c
167. IP address helps to ______ a computer connected to a network.
(a) uniquely identify
(b) format
(c) reset
(d) reject
Ans. a
168. Port number on a computer host connected to a network denotes a ______.
(a) background server program
(b) client program
(c) both a & b
(d) none of them
Ans. c
169. A program which runs in the background and sends results requested by a client is called a .
(a) server
(b) client
(c) port
(d) IP address
Ans. a
170. A program which runs in the foreground, communicates with server and displays results sent by the server is called a ______.
(a) server
(b) client
(c) port
(d) IP address
Ans. b
171. Computers connected to a network without any client or server system (all hosts are equally equally important) are in _______ network.
(a) client server
(b) peer to peer
(c) firewall
(d) proxy server
Ans. b
P a g e | 260
172. The intermediary host which communicates with the clients on behalf of a another server is called ______.
(a) proxy server
(b) firewall
(c) ethernet
(d) WiFi
Ans. a
173. The intermediary host which protects a network from any communication with prohibited hosts outside the protected network is called ______.
(a) proxy server
(b) firewall
(c) ethernet
(d) WiFi
Ans. b
174. Firewall can______ .
(a) deny access to specific sites
(b) allow access to only white listed sites
(c) both a & b
(d) none of them
Ans. c
175. A proxy server which simply forwards messages from one network to another network is called ________ proxy.
(a) gateway/ tunneling
(b) forward proxy
(c) reverse proxy
(d) all of them
Ans. a
176. A proxy server which communicates with the Internet and retrieves data from the Internet is called _______ proxy.
(a) gateway/ tunneling
(b) forward proxy
(c) reverse proxy
(d) all of them
Ans. b
177. A proxy server which communicates with the servers in a local network (for services like decryption, authentication, etc.) is called ______ proxy.
(a) gateway/ tunneling
(b) forward proxy
(c) reverse proxy
(d) all of them
Ans. c
178. Firewall can be implemented through ________.
(a) hardware
(b) software
(c) both a & b
(d) none of them
Ans. c
179. The design adopted for connecting several hosts on a network is called______ .
(a) telephony
(b) wiring
(c) connection
(d) topology
Ans. d
180. When 2 devices are connected through a dedicated line, it is _____ topology.
(a) point to point
(b) bus
(c) star
(d) ring
Ans. a
181. When all nodes are connected to a central hub, it is_____ topology. (a) point to point (b) bus (c) star (d) ring Ans. c 182. When all nodes are connected in a circular form (the first node becomes the last node), it is _______ topology. (a) point to point (b) bus (c) star (d) ring Ans. d P a g e | 261
183. When each host has a dedicated line connected to any other host on the network, it is _______ topology.
(a) fully connected
(b) Daisy chain
(c) tree
(d) partly connected
Ans. a
184. When each host has a dedicated line connected to any other host on the network, it is ______ topology.
(a) fully connected
(b) daisy chain
(c) tree
(d) partly connected
Ans. a
185. When computers are connected in chain (from one host to another) and data hops between hosts till it reaches the intended host, it is______ topology.
(a) fully connected
(b) daisy chain
(c) tree
(d) partly connected
Ans. b
186. When data travels in branching connections to reach intended host, the network topology is called _______ .
(a) fully connected
(b) daisy chain
(c) tree
(d) partly connected
Ans. c
187. When hosts are connected in a part fully connected manner (with many missing connections), it is _______ topology.
(a) fully connected
(b) daisy chain
(c) tree
(d) partly connected
Ans. d
188. Usually, the network connecting hosts inside a single building is called______.
(a) LAN
(b) WAN
(c) MAN
(d) none of them
Ans. a
189. Usually, the network connecting hosts inside a city/ metropoliton limit is called______.
(a) LAN
(b) WAN
(c) MAN
(d) none of them
Ans. c
190. Usually, the network connecting hosts located in several cities or nations is called ______.
(a) LAN
(b) WAN
(c) MAN
(d) none of them
Ans. b
191. When network hosts are connected without wires,_______ protocol is used.
(a) LAN
(b) WAN
(c) MAN
(d) WLAN
Ans. d
192. MODEM is a device used for converting______.
(a) digital signal to analog
(b) analog signal to digital
(c) both a & b
(d) neither a nor b
Ans. c
193. MODEM is used to convey data over ________.
(a) air
(b) telephone line
(c) train track
(d) bus route
Ans. b
P a g e | 262
194. Hub is _______to switch/ bridge since it repeats data even to the unwanted connections.
(a) inferior
(b) superior
(c) equivalent
(d) none of them
Ans. a
195. The networking device which receives a packet and repeats it to just the intended recipient lines is called a ________.
(a) hub
(b) switch
(c) MODEM
(d) none of them
Ans. b
196. Switch is_______ to a hub since unwanted repetitions are curtailed.
(a) inferior
(b) superior
(c) equivalent
(d) none of them
Ans. b
197. The device used to transfer data from one network to another network on the Internet is called
(a) hub
(b) switch
(c) MODEM
(d) router
Ans. d
198. The device which connects one Local Area Network to another Local Area Network is called
(a) hub
(b) switch
(c) MODEM
(d) bridge
Ans. d
199 . The node which connects one large network (a WAN, MAN, etc.) to another large network is called ______ .
(a) hub
(b) switch
(c) gateway
(d) MODEM
Ans. c
200. The cable containing 4 pairs of twisted wires without any shielding foil for data transmission is called ______ .
(a) unshielded twisted cable
(b) shielded twisted cable
(c) coaxial cable
(d) fibre optic cable
Ans. a
201. The cable containing 4 pairs of twisted wires with shielding foil to control interference with other electrical signals and used for data transmission is called______.
(a) unshielded twisted cable
(b) shielded twisted cable
(c) coaxial cable
(d) fibre optic cable
Ans. b
202. A cable with single copper core and braided metal shield is called_____ .
(a) unshielded twisted cable
(b) shielded twisted cable
(c) coaxial cable
(d) fibre optic cable
Ans. c
203. A cable with single fibre optic core line surrounded by several layers of protective materials is called _____ .
(a) unshielded twisted cable
(b) shielded twisted cable
(c) coaxial cable
(d) fibre optic cable
Ans. d
P a g e | 263
204. Fibre optic cables are _______ interferences from electric cables and electromagnetic waves.
(a) prone to
(b) unaffected by
(c) susceptible to
(d) affected by
Ans. b
205. Out of the several cable options, ________ cable provides high speed over long distances without being affected by local interferences.
(a) fibre optic
(b) unshielded twisted pair
(c) shielded twisted pair
(d) none of them
Ans. a
206. Wireless networks communicate using _______ signal instead of cables.
(a) infrared
(b) low frequency radio wave
(c) Wireless Fidelity (WiFi - IEEE 802.11 standard)
(d) all of them
Ans. d
207. In the modern days, _______ is the best choice for wireless networking.
(a) WiFi
(b) infrared
(c) radio waves
(d) micro-wave
Ans. a
208. The WiFi standard which permits transmission distance of 50m with data rate of 54MBPS is__
(a) IEEE 802.11a
(b) IEEE 802.11b
(c) IEEE 802.11g
(d) IEEE 802.11n
Ans. a
209. The WiFi standard which permits transmission distance of 100m with data rate of 11MBPS is_
(a) IEEE 802.11a
(b) IEEE 802.11b
(c) IEEE 802.11g
(d) IEEE 802.11n
Ans. b
210. The WiFi standard which permits transmission distance of 100m with data rate of 54MBPS is_
(a) IEEE 802.11a
(b) IEEE 802.11b
(c) IEEE 802.11g
(d) IEEE 802.11n
Ans. c
211. The WiFi standard which permits transmission distance of more than 100m with data rate of 100MBPS is ______
(a) IEEE 802.11a
(b) IEEE 802.11b
(c) IEEE 802.11g
(d) IEEE 802.11n
Ans. d
212. Wireless networks are _______wired networks.
(a) slower than
(b) faster than
(c) as fast as
(d) none of them
Ans. a
213. In terms of data safety, wireless networks are______ wired networks.
(a) more secure than
(b) less secure than
(c) as safe as
(d) none of them
Ans. b
P a g e | 264
214. Normally, WiFi signal reach _______m distance.
(a) 50 to 100m
(b) 1 to 2m
(c) 0.5 to 1.0m
(d) 2 to 3m
Ans. a
215. WiFi networks have ________for connecting.
(a) name
(b) password
(c) both a & b
(d) none of them
Ans. c
216. Name of a WiFi network may be_______.
(a) visible
(b) invisible
(c) both a & b
(d) none of them
Ans. c
217. Open WiFi networks have_______ .
(a) a visible name
(b) no password
(c) visible name without any password
(d) none of them
Ans. d
218. The technology which permits data transmission between devices like computers, mobile phones, tablets, headsets, etc. is called ______
(a) Bluetooth
(b) coaxial cable
(c) fibre optic cable
(d) twisted pair cable
Ans. a
219. The network established using Bluetooth technology is called a ______.
(a) Local Area Network (LAN)
(b) Wide Area Network (WAN)
(c) Metropolitan Area Network (MAN)
(d) Personal Area Network (PAN)
Ans. d
220. Bluetooth permits_____ .
(a) pairing by acceptance
(b) pairing by password authentication
(c) pairing by verification
(d) all of them
Ans. d
221. The fifth layer of the OSI model is _____layer and it controls connection between 2 hosts (like client and server) during data communication.
(a) session
(b) presentation
(c) application
(d) transport
Ans. a
222. The sixth layer of the OSI model is _______ layer and it takes care of encryption, decryption, compression, decompression and data encoding.
(a) session
(b) presentation
(c) application
(d) transport
Ans. b
223. The seventh layer of the OSI model is _____layer and it deals with file sharing, video sharing, audio sharing, browsing, etc. using specific programs.
(a) session
(b) presentation
(c) application
(d) transport
Ans. c
P a g e | 265
224. UDP stands for _____.
(a) Unified Datagram Protocol
(b) User Datagram Protocol
(c) User Datagram Procedure
(d) User Digital Protocol
Ans. b
225. _______ allows for mapping IP address to an ethernet or hardware address.
(a) Address Resolution Protocol (ARP)
(b) Reverse Address Resolution Protocol (RARP)
(c) Open System Interconnection (OSI)
(d) none of them
Ans. a
226. ______ is the version of Internet Protocol now being phased out.
(a) IP version 1 (IPV1)
(b) IP version 2 (IPV2)
(c) IP version 4 (IPV4)
(d) IP version 6 (IPV6)
Ans. c
227. _____is the version of Internet Protocol now being introduced to handle increased size of the Internet.
(a) IP version 1 (IPV1)
(b) IP version 2 (IPV2)
(c) IP version 4 (IPV4)
(d) IP version 6 (IPV6)
Ans. d
228. IPV4 addresses have a ______ by numeric address.
(a) 4
(b) 6
(c) 8
(d) 16
Ans. a
229. The addresses 216.58.213.36 (www.google.com), 209.191.88.254 (www.yahoo.com) belong to IP version ______.
(a) 1
(b) 2
(c) 3
(d) 4
Ans. d
230. In a client server network, the ports in the range of 0 to 1023 are called ______ ports.
(a) relational ports
(b) general ports
(c) well known ports
(d) user ports
Ans. c
231. Network protocols are standardized through______ .
(a) Request For Comment (RFC)
(b) email
(c) web server
(d) telnet
Ans. a
232. RFC in networking stands for _____.
(a) Rejection For Comment
(b) Request For Comment
(c) Request For Contest
(d) Request Freight Comment
Ans. b
233. TCP/IP port number 7 is assigned for ______ protocol.
(a) daytime
(b) echo
(c) quote of the day
(d) message send
Ans. b
234. TCP/IP port number 13 is assigned for ______ protocol.
(a) daytime
(b) echo
(c) quote of the day
(d) message send
Ans. a
P a g e | 266
235. TCP/IP port number 17 is assigned for protocol.
(a) daytime
(b) echo
(c) quote of the day
(d) message send
Ans. c
236. TCP/IP port number 18 is assigned for protocol.
(a) daytime
(b) echo
(c) quote of the day
(d) message send
Ans. d
237. TCP/IP port number 20 is assigned for______.
(a) Telnet
(b) Simple Mail Transfer Protocol (SMTP)
(c) File Transfer Protocol Protocol (FTP)
(d) Trivial File Transfer Protocol (TFTP)
Ans. c
238. TCP/IP port number 23 is assigned for______.
(a) Telnet
(b) Simple Mail Transfer Protocol (SMTP)
(c) File Transfer Protocol Protocol (FTP)
(d) Trivial File Transfer Protocol (TFTP)
Ans. a
239. TCP/IP port number 25 is assigned for______.
(a) Telnet
(b) Simple Mail Transfer Protocol (SMTP)
(c) File Transfer Protocol Protocol (FTP)
(d) Trivial File Transfer Protocol (TFTP)
Ans. b
240. TCP/IP port number 69 is assigned for _______.
(a) Telnet
(b) Simple Mail Transfer Protocol (SMTP)
(c) File Transfer Protocol Protocol (FTP)
(d) Trivial File Transfer Protocol (TFTP)
Ans. d
241. TCP/IP port number 80 is assigned for_______.
(a) Hyper Text Transfer Protocol (HTTP)
(b) Post Office Protocol (POP)
(c) Structured Query Language (SQL)
(d) Network News Transfer Protocol (NNTP)
Ans. a
242. TCP/IP port number 109 is assigned for _______.
(a) Hyper Text Transfer Protocol (HTTP)
(b) Post Office Protocol (POP)
(c) Structured Query Language (SQL)
(d) Network News Transfer Protocol (NNTP)
Ans. b
243. TCP/IP port number 118/ 156 is assigned for ______.
(a) Hyper Text Transfer Protocol (HTTP)
(b) Post Office Protocol (POP)
(c) Structured Query Language (SQL) (d) Network News Transfer Protocol (NNTP)
Ans. c
P a g e | 267
244. TCP/IP port number 119/ 443 is assigned for ______.
(a) Hyper Text Transfer Protocol (HTTP)
(b) Post Office Protocol (POP)
(c) Structured Query Language (SQL)
(d) Network News Transfer Protocol (NNTP)
Ans. d
245. TCP/IP port number 143/ 220 is assigned for ______ .
(a) Internet Message Access Protocol (IMAP)
(b) Simple Network Management Protocol (SNMP)
(c) Internet Relay Chat (IRC)
(d) Precision Time Protocol (PTP)
Ans. a
246. TCP/IP port number 161 is assigned for ______.
(a) Internet Message Access Protocol (IMAP)
(b) Simple Network Management Protocol (SNMP)
(c) Internet Relay Chat (IRC)
(d) Precision Time Protocol (PTP)
Ans. b
247. TCP/IP port number 443 is assigned for _______.
(a) HTTP over Secure Socket Layer HTTPS
(b) Remote Procedure Call (RPC)
(c) Dynamic Host Configuration Protocol (DHCP)
(d) Internet Message Access Protocol over Secure Socket Layer (IMAPS)
Ans. a
248. TCP/IP port number 530 is assigned for _______.
(a) HTTP over Secure Socket Layer HTTPS
(b) Remote Procedure Call (RPC)
(c) Dynamic Host Configuration Protocol (DHCP)
(d) Internet Message Access Protocol over Secure Socket Layer (IMAPS)
Ans. b
249. TCP/IP port number 546/ 547 is assigned for______ .
(a) HTTP over Secure Socket Layer HTTPS
(b) Remote Procedure Call (RPC)
(c) Dynamic Host Configuration Protocol (DHCP)
(d) Internet Message Access Protocol over Secure Socket Layer (IMAPS)
Ans. c
250. TCP/IP port number 993 is assigned for ______.
(a) HTTP over Secure Socket Layer HTTPS
(b) Remote Procedure Call (RPC)
(c) Dynamic Host Configuration Protocol (DHCP)
(d) Internet Message Access Protocol over Secure Socket Layer (IMAPS)
Ans. d
251. FTP runs on port number ______.
(a) 7
(b) 13
(c) 20
(d) 23
Ans. c
P a g e | 268
252. The FTP server which does not require login process is called______ .
(a) Hyper Text Transmission Protocol
(b) Simple Mail Transfer Protocol
(c) Network Time Protocol
(d) Anonymous File Transfer Protocol
Ans. d
253. Using FTP, a file can be copied from remote system to the local system using the command .
(a) get
(b) put
(c) cd
(d) lcd
Ans. a
254. Using FTP, a file can be copied from local host to remote host using the command ______.
(a) get
(b) put
(c) cd
(d) lcd
Ans. b
255. Using FTP, working directory on the remote host can be changed using the command_____ .
(a) pwd
(b) put
(c) cd
(d) lcd
Ans. c
256. Using FTP, working directory on the local host can be changed using the command______ .
(a) pwd
(b) bye
(c) cd
(d) lcd
Ans. d
257. Using FTP, list of files on the remote host can be viewed using the command______.
(a) pwd
(b) bye
(c) cd
(d) lcd
Ans. a
258. Using FTP, a file on the remote host may be deleted using the command______.
(a) delete
(b) bye
(c) cd
(d) lcd
Ans. a
259. Using FTP, connection to remote FTP server may be terminated using the command______ .
(a) delete
(b) bye/ quit
(c) cd
(d) lcd
Ans. b
260. Popular FTP clients are .
(a) CoreFTP
(b) FireFTP
(c) FileZilla
(d) all of them
Ans. d
261. The network protocol which permits a person to login to a remote computer, access files, execute commands on the remote computer, etc. is called ______
(a) FTP
(b) HTTP
(c) Telnet
(d) SMTP
Ans. c
262. Port No._____ is reserved for telnet protocol.
(a) 7
(b) 13
(c) 20
(d) 23
Ans. d
263. Usually, telnet connection is established using ______command followed by name of host.
(a) ftp
(b) telnet
(c) ping
(d) ls
Ans. b
P a g e | 269
264. The address of the physical networking component (like ethernet, WiFi, etc.) is called ______ address.
(a) virtual
(b) logical
(c) physical
(d) imaginary
Ans. c
265. The address assigned to a host on getting connected to a network (like the Internet) is called ______ address.
(a) virtual
(b) logical
(c) physical
(d) imaginary
Ans. b
266. In networking, MAC stands for _____.
(a) Media Address Control
(b) Machine Access Control
(c) Media Access Contact
(d) Media Access Control
Ans. d
267. Logical address of a host connected to a network is otherwise called _____ address.
(a) IP address
(b) IP version 4 address
(c) IP version 6 address
(d) all of them
Ans. d
268. The addresses of class A network has subnet mask of ______.
(a) 255.0.0.0
(b) 255.255.0.0
(c) 255.255.255.0
(d) none of them
Ans. a
269. The addresses of class B network has subnet mask of ______.
(a) 255.0.0.0
(b) 255.255.0.0
(c) 255.255.255.0
(d) none of them
Ans. B
270.The addresses of class C network has subnet mask of ______ .
(a) 255.0.0.0
(b) 255.255.0.0
(c) 255.255.255.0
(d) none of them
Ans. C
271. First byte of class A network is in the range of _______.
(a) 1 - 126
(b) 128 – 191
(c) 192 - 223
(d) none of them
Ans. A
272. First byte of class B network is in the range of ______.
(a) 1 - 126
(b) 128 – 191
(c) 192 - 223
(d) none of them
Ans. B
273. First byte of class C network is in the range of _____.
(a) 1 - 126
(b) 128 – 191
(c) 192 - 223
(d) none of them
Ans. C
274. Each class A network supports ______hosts.
(a) 1,67,77,214
(b) 65,534
(c) 254
(d) none of them
Ans. A
275. Each class B network supports _______ hosts.
(a) 1,67,77,214
(b) 65,534
(c) 254
(d) none of them
Ans. b
P a g e | 270
276. Each class C network supports _______hosts.
(a) 1,67,77,214
(b) 65,534
(c) 254
(d) none of them
Ans. C
277. IPV4 has got_______ bits for addressing of hosts.
(a) 128
(b) 64
(c) 32
(d) 16
Ans. C
278. The TCP/IP protocol which permits sharing of large files over the Internet is called ______ .
(a) File Transfer Protocol (FTP)
(b) Hyper Text Transmission Protocol (HTTP)
(c) Simple Mail Transfer Protocol (SMTP)
(d) Network Time Protocol (NTP)
Ans. A
279. IPV6 has got _____bits for addressing of hosts.
(a) 128
(b) 64
(c) 32
(d) 16
Ans. A
280. IPV4 has got _____ bytes for addressing of hosts.
(a) 16
(b) 8
(c) 4
(d) 2
Ans. C
281. IPV6 has got ______bytes for addressing of hosts.
(a) 16
(b) 8
(c) 4
(d) 2
Ans. a
282. What are Protocols?
Ans. Agreements on how communication components and DTE
283. You have 10 users plugged into a hub running 10Mbps half-duplex. There is a server connected to the switch running 10 Mbps half-duplex as well. How much bandwidth does each host have to the server?
Ans. 10Mbps
284. NFC stands for________
a) Near field communication
b) New field communication
c) Near firm communication
d) Near Field Camera
Ans. A
285. VPN stands for________.
a) vita power nation
b) virtual private network
c) very powerful network
d) very powerful nation
Ans. B
286. Father of networking ________
a) ray noorda
b) jef bejos
c) stan lee
d) tim berners lee
Ans. a
P a g e | 271
287. when data transfer only one direction is called ______.
a) Half duplex
b) simplex
c) full duplex
d) communication
Ans. b
288. Bus topology is also called __________.
a) line topology
b) linear topology
c) star topology
d) Both A and B
Ans. D
289. Which topology use in LAN ?
a) BUS/Horizontal Topology
b) Hybrid
Ans. A
290. In computer network the central computer is called ______.
a) server
b) router
Ans. A
291. Each IP Packet must contain __________
a) Source and Destination address
b) Destination Address only
Ans. A
292.Which of the following cable transmits messages in the form of light waves?
A) STP cable
B )UTP cable
C) Co-axial cable
D) Optical fibre cable
Ans. D
293. The systematic design (like radial, ring, etc.) of connecting computers in a network is called network _______.
(a) topology
(b) protocol
(c) firewall
(d) antivirus
Ans. a
294. WLAN stands for______ .
(a) Wireless Local Area Network
(b) Wired Local Area Network
(c) Wireless Local Area Number
(d) Wireless Local Arithmatic Network
Ans. A
295. The device which repeats a signal on all lines except incoming one is called _______.
(a) hub
(b) switch
(c) MODEM
(d) router
Ans. a
296. Bluetooth signals have a range of ________.
(a) 1m
(b) 5m
(c) 10m
(d) 100m
Ans. C
297. W3C in networking stands for ______.
(a) World Wide Winter Consortium
(b) World Wide Web Contest
(c) World White Web Consortium
(d) World Wide Web Consortium
Ans. d
No comments:
Post a Comment