1.
TCP/IP reference model contains how many layers
Correct Answer
B. 4
Explanation
The correct answer is 4 because the TCP/IP reference model consists of four layers: the Network Interface layer, the Internet layer, the Transport layer, and the Application layer. Each layer has its own specific functions and protocols to ensure reliable communication over the internet.
2.
Which protocol deals with emails
Correct Answer
B. SMTP
Explanation
SMTP (Simple Mail Transfer Protocol) is the correct answer because it is the protocol specifically designed for sending and receiving emails. FTP (File Transfer Protocol) is used for transferring files, LPD (Line Printer Daemon) is used for printing over a network, and X Window is a system for managing graphical user interfaces. Therefore, SMTP is the most appropriate protocol for dealing with emails.
3.
Which protocol deals with resolving domain names
Correct Answer
C. DNS
Explanation
DNS (Domain Name System) is the correct answer because it is the protocol that deals with resolving domain names. DNS translates domain names into IP addresses, allowing users to access websites by typing in easy-to-remember domain names instead of complex numerical IP addresses. X-Window is a protocol used for remote graphical user interface (GUI) connections, SMTP is a protocol used for sending email, and FTP is a protocol used for file transfer.
4.
If you use either Telnet or FTP, which is the highest layer you are using to transmit data?
Correct Answer
A. Application
Explanation
When using either Telnet or FTP, the highest layer being used to transmit data is the Application layer. This layer is responsible for providing services and protocols that allow user applications to access the network and transmit data. Telnet and FTP are both application layer protocols that enable users to remotely access and transfer files over a network.
5.
TCP/IP layer is equivalent to combined Session, Presentation and
Correct Answer
B. Application layer
Explanation
The TCP/IP layer is equivalent to the Application layer because it is responsible for providing network services to applications. This layer interacts directly with the end-user and is responsible for tasks such as data formatting, encryption, and authentication. The Application layer protocols include HTTP, FTP, SMTP, and DNS, which are all used by various applications to communicate over the network. Therefore, the TCP/IP layer corresponds to the Application layer.
6.
Which one d HTTP is ________ protocol.
Correct Answer
A. Application layer
Explanation
HTTP (Hypertext Transfer Protocol) is a protocol used for communication between web browsers and web servers. It operates at the application layer of the TCP/IP protocol stack, which is responsible for providing communication services directly to user applications. The application layer is the topmost layer in the TCP/IP model and is responsible for protocols that enable user applications to access the network. Therefore, HTTP is an application layer protocol.
7.
TCP protocol is
​​​​
Correct Answer
B. Connection oriented
Explanation
The correct answer is "connection oriented." This means that the TCP protocol establishes a reliable and dedicated connection between the sender and receiver before data transmission occurs. This connection ensures that data is delivered in the correct order and without errors. TCP also guarantees that data packets are acknowledged and retransmitted if necessary, providing a reliable and ordered data transfer mechanism.
8.
Application layer offers _______ service.
Correct Answer
A. End to end
Explanation
The application layer offers end to end service. This means that it provides communication between the end users or applications on different hosts. It ensures that the data is delivered accurately and reliably from the source to the destination, without any loss or corruption. The application layer is responsible for managing the communication between the user and the network, and it provides services such as email, file transfer, and web browsing.
9.
Pick the odd one out:
Correct Answer
D. Interactive games
Explanation
The odd one out is "Interactive games" because it does not involve the transfer or download of files like the other options. File transfer and file download are both processes related to moving files from one location to another, while email involves sending and receiving electronic messages. However, interactive games do not typically involve the transfer or download of files, but rather focus on real-time interaction and gameplay.
10.
File to the Web site is transferred by using:
Correct Answer
C. FTP
Explanation
Files to a website are transferred using FTP (File Transfer Protocol). FTP is a standard network protocol used to transfer files from one host to another over a TCP-based network, such as the internet. It allows for the uploading and downloading of files between a client and a server. HTTP (Hypertext Transfer Protocol) is used for transferring web pages and data on the World Wide Web, but it is not specifically designed for file transfers. ASCII is a character encoding standard, not a file transfer protocol. Therefore, the correct answer is FTP.
11.
Computer can be linked to internet through the
​​​
Correct Answer
D. All of these
Explanation
All of these options can be used to link a computer to the internet. A phone-line modem allows the computer to connect to the internet using a telephone line. DSL (Digital Subscriber Line) uses a high-speed broadband connection over traditional copper telephone lines. A cable modem connects the computer to the internet through a cable television network. Therefore, all of these options are valid methods to link a computer to the internet.
12.
Verification of a login name and password is known as:
Correct Answer
C. Authentication
Explanation
Authentication refers to the process of verifying the identity of a user or system. In the context of a login name and password, authentication involves confirming that the provided credentials match the authorized user's information. This process ensures that only authorized individuals can gain access to a system or application, enhancing security and protecting sensitive data.
13.
Internet is
Correct Answer
D. All of the above
Explanation
The correct answer is "All of the above" because the internet is a dynamic system that constantly changes and evolves. It is also a complex system with multiple interconnected components and layers. Additionally, the internet is decentralized, meaning that it does not have a central authority or control, but rather operates through a network of interconnected devices and servers.
14.
TCP/IP suite was created by
​​​​
Correct Answer
A. IEEE
Explanation
The TCP/IP suite was created by the IEEE.
15.
A device operating at the network layer is called a
Correct Answer
B. Router
Explanation
A device operating at the network layer is called a router. A router is a networking device that forwards data packets between computer networks. It determines the best path for data transmission based on the destination IP address of the packets. Routers are responsible for directing traffic efficiently and securely across networks, allowing different networks to communicate with each other. Unlike bridges and hubs, routers have the ability to make intelligent decisions about how to route data, making them essential for connecting multiple networks together.
16.
_________ are rules that govern a communication exchange.
Correct Answer
C. Protocols
Explanation
Protocols are a set of rules that govern the exchange of information or communication between different devices or systems. They define the format, order, and error-checking procedures for transmitting data. Protocols ensure that communication is reliable, efficient, and standardized. Media refers to the channels through which data is transmitted, while interfaces are the physical or virtual connections between devices. While both media and interfaces are important in communication, protocols specifically define the rules and procedures for the exchange of information. Therefore, protocols are the correct answer in this context.
17.
Encryption and decryption are functions of
Correct Answer
C. Presentation layer
Explanation
Encryption and decryption are functions of the Presentation layer. The Presentation layer is responsible for the translation, compression, and encryption of data. Encryption is the process of converting plain text into a secret code to protect it from unauthorized access, while decryption is the reverse process of converting the encrypted code back into plain text. Therefore, the Presentation layer is the correct answer as it handles the encryption and decryption functions.
18.
TELNET, FTP, SMTP, Protocols fall in the following layer of OSI reference model
Correct Answer
D. Application Layer
Explanation
TELNET, FTP, and SMTP are all application layer protocols. The application layer is responsible for providing network services to user applications. These protocols are used for specific applications such as remote login (TELNET), file transfer (FTP), and email transfer (SMTP). The application layer protocols interact with the lower layers of the OSI reference model to establish communication between different systems on a network. Therefore, these protocols fall in the Application Layer of the OSI reference model.
19.
UDP is ___________ protocol.
Correct Answer
B. Connectionless
Explanation
UDP is a connectionless protocol because it does not establish a dedicated connection between the sender and receiver before transmitting data. It operates by simply sending data packets without any acknowledgment or guarantee of delivery. This lack of connection establishment and reliability makes UDP a faster and more efficient protocol compared to connection-oriented protocols like TCP. However, it also means that UDP does not provide error checking or retransmission of lost packets, making it less reliable for certain types of applications that require guaranteed delivery.
20.
How many bits internet address is assigned to each host on an IP4 internet which is used in all communications with the host?
Correct Answer
B. 32 bits
Explanation
Each host on an IP4 internet is assigned a 32-bit internet address. This means that there are 2^32 possible unique addresses that can be assigned to different hosts. The 32-bit address is used in all communications with the host, allowing for the identification and routing of data packets over the internet.