1.
Computer Network is
Correct Answer
D. All of the Above
Explanation
The correct answer is "All of the Above" because a computer network is indeed a collection of hardware components and computers that are interconnected by communication channels. Additionally, a computer network allows for the sharing of resources and information among the connected devices. Therefore, all the given options accurately describe what a computer network is.
2.
What is a Firewall in Computer Network?
Correct Answer
C. A system designed to prevent unauthorized access
Explanation
A firewall is a system designed to prevent unauthorized access to a computer network. It acts as a barrier between the internal network and external networks, such as the internet, by monitoring and controlling incoming and outgoing network traffic. It uses a set of rules to determine which traffic is allowed or blocked, based on factors such as the source and destination IP addresses, port numbers, and protocols. By doing so, a firewall helps protect the network from potential security threats and unauthorized access attempts.
3.
How many layers does the OSI Reference Model have?
Correct Answer
D. 7
Explanation
The OSI Reference Model has seven layers. This model is a conceptual framework that standardizes the functions of a communication system into different layers, each with specific tasks and responsibilities. These layers include the Physical, Data Link, Network, Transport, Session, Presentation, and Application layers. Each layer performs a specific function in the process of transmitting data across a network.
4.
DHCP is the abbreviation of
Correct Answer
B. Dynamic Host Configuration Protocol
Explanation
DHCP stands for Dynamic Host Configuration Protocol. This protocol is responsible for assigning IP addresses dynamically to devices on a network. It allows devices to automatically obtain an IP address, subnet mask, default gateway, and other network configuration parameters from a DHCP server. This eliminates the need for manual IP address assignment, making network administration more efficient.
5.
IPV4 Address is
Correct Answer
C. 32 bit
Explanation
An IPv4 address is a 32-bit numerical value that is used to identify a device on a network. It is divided into four octets, each consisting of 8 bits, separated by periods. This addressing scheme allows for a total of approximately 4.3 billion unique addresses, which are assigned to devices such as computers, servers, and routers. IPv4 addresses are essential for communication and routing on the internet, but due to the limited number of available addresses, the transition to IPv6, which uses 128-bit addresses, is being implemented.
6.
DNS is the abbreviation of
Correct Answer
C. Domain Name System
Explanation
DNS stands for Domain Name System. It is a decentralized naming system that translates domain names into IP addresses. The DNS is responsible for mapping human-readable domain names to the corresponding IP addresses of the servers hosting the websites or services associated with those domain names. This allows users to access websites or services by simply typing in the domain name instead of the complex IP address. The DNS plays a crucial role in the functioning of the internet by enabling the efficient and reliable communication between devices connected to the network.
7.
What is the meaning of Bandwidth in Network?
Correct Answer
A. Transmission capacity of a communication channels
Explanation
Bandwidth in a network refers to the transmission capacity of a communication channel. It represents the amount of data that can be transmitted over a network in a given amount of time. It is measured in bits per second (bps) and determines how quickly data can be transferred between devices on the network. A higher bandwidth allows for faster and more efficient data transmission, while a lower bandwidth may result in slower network speeds and increased latency.
8.
What is the use of Bridge in Network?
Correct Answer
A. To connect LANs
Explanation
Bridges are used to connect LANs (Local Area Networks). They act as a link between two or more LANs, allowing devices from different LANs to communicate with each other. By forwarding data packets between LANs, bridges enable seamless communication and the sharing of resources across the network. Bridges do not separate LANs or control network speed; their primary purpose is to facilitate connectivity between LANs. Therefore, the correct answer is "to connect LANs."
9.
Router operates in which layer of OSI Reference Model?
Correct Answer
B. Layer 3 (Network Layer)
Explanation
A router operates in the network layer of the OSI Reference Model. The network layer is responsible for routing packets across different networks. Routers receive packets from one network, examine the destination IP address, and determine the best path to forward the packet to its destination. They make decisions based on routing tables and protocols such as IP. Therefore, the correct answer is Layer 3 (Network Layer).
10.
Each IP packet must contain
Correct Answer
C. Source and Destination address
Explanation
Each IP packet must contain both the source and destination address because these addresses are essential for routing the packet through the network. The source address identifies the sender of the packet, while the destination address specifies the intended recipient. This information allows routers to determine the appropriate path for the packet to reach its destination. Without both addresses, the packet would not be able to reach its intended destination effectively.
11.
Bridge works in which layer of the OSI model?
Correct Answer
D. Datalink layer
Explanation
The correct answer is the Datalink layer. The Datalink layer is responsible for the reliable transmission of data between adjacent network nodes. It provides error-free transmission and ensures that data is properly formatted for transmission over the physical network. Bridges operate at this layer by examining the MAC addresses of incoming frames and forwarding them to the appropriate destination. They help to connect multiple network segments and improve network performance by reducing congestion.
12.
Which of following provides reliable communication?
Correct Answer
A. TCP
Explanation
TCP (Transmission Control Protocol) provides reliable communication because it ensures that data is delivered in the correct order and without errors. It uses acknowledgments and retransmissions to guarantee that all data packets are received by the intended recipient. TCP also handles congestion control, flow control, and error detection, making it a reliable choice for communication. IP (Internet Protocol) is responsible for addressing and routing packets over the network, while UDP (User Datagram Protocol) is a connectionless protocol that does not provide reliability features like TCP. Therefore, TCP is the correct choice for reliable communication.
13.
. Which of the following can be Software?
Correct Answer
B. Firewalls
Explanation
Firewalls can be considered as software because they are a type of security software that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Firewalls are installed on computer systems or network devices and work by examining data packets and determining whether to allow or block them based on the configured rules. Therefore, firewalls are a type of software used for network security purposes.
14.
In which type of RAID, data is mirrored between two disk?
Correct Answer
B. RAID 1
Explanation
RAID 1 is the correct answer because it is a type of RAID that involves mirroring data between two disks. In RAID 1, data is duplicated on two separate disks, providing redundancy and ensuring that if one disk fails, the data is still accessible from the other disk. This type of RAID is commonly used for data protection and high availability purposes.
15.
What is the IP Address range of APIPA?
Correct Answer
D. 169.254.0.1 to 169.254.255.255
Explanation
The correct answer is 169.254.0.1 to 169.254.255.255. This is the correct IP address range for Automatic Private IP Addressing (APIPA). APIPA is a feature in Windows operating systems that allows devices to assign themselves an IP address if they are unable to obtain one from a DHCP server. The range 169.254.0.1 to 169.254.255.255 is reserved specifically for APIPA, ensuring that devices on the same network can communicate with each other using these self-assigned IP addresses.
16.
Which of the following is correct in CIDR?
Correct Answer
D. There is no concept of class A, B, C networks
Explanation
The concept of class A, B, C networks is not applicable in CIDR (Classless Inter-Domain Routing). CIDR introduced a more flexible way of allocating IP addresses by allowing variable-length subnet masks. This means that the traditional class-based system, where certain ranges of IP addresses were reserved for specific classes (A, B, C), is no longer used. Instead, CIDR allows for the allocation of IP addresses based on the actual number of required hosts, resulting in a more efficient use of IP address space.
17.
What is the natural mask for a class C Network?
Correct Answer
B. 255.255.255.0
Explanation
The natural mask for a class C network is 255.255.255.0. In classful networking, the class C network range is from 192.0.0.0 to 223.255.255.255, and the default subnet mask for this range is 255.255.255.0. This mask allows for 256 subnets and 254 hosts per subnet, making it suitable for small to medium-sized networks.
18.
Which one of the following computer network is built on the top of another network?
Correct Answer
D. Overlay network
Explanation
An overlay network is a computer network that is built on top of another network. It is used to enable communication between different networks or to provide additional services on top of an existing network. This type of network allows for virtual connections to be established between nodes, regardless of their physical locations or the underlying network infrastructure. It is commonly used in scenarios where there is a need to create a separate network with specific functionalities without modifying the underlying network.
19.
Bluetooth is an example of
Correct Answer
A. Personal area network
Explanation
Bluetooth is an example of a personal area network (PAN). A PAN is a network that is used for communication between devices in close proximity to each other, typically within a range of 10 meters. Bluetooth technology allows devices such as smartphones, laptops, and headphones to connect and communicate with each other wirelessly. It is commonly used for tasks such as transferring files, streaming audio, and connecting peripherals like keyboards and mice. Therefore, Bluetooth fits the definition and characteristics of a personal area network.
20.
In computer network nodes are
Correct Answer
A. The computer that originates the data
Explanation
In computer networks, nodes refer to the various devices or computers that are connected to the network. These nodes can perform different functions within the network, such as originating, routing, or terminating data. However, in this case, the correct answer is "the computer that originates the data." This means that the node in question is responsible for starting or creating the data that will be transmitted across the network.
21.
What is the benefit of Networking?
Correct Answer
D. All of the Above
Explanation
Networking provides several benefits, including file sharing, easier access to resources, and easier backups. By connecting multiple devices in a network, users can easily share files and collaborate on projects. Networking also allows for easier access to shared resources such as printers, scanners, and storage devices, enhancing productivity. Additionally, networking enables automated backups, ensuring that important data is securely stored and easily recoverable in case of any issues. Therefore, the correct answer is "All of the Above."
22.
The meaning of Straight-through Cable is
Correct Answer
A. Four wire pairs connect to the same pin on each end
Explanation
A straight-through cable refers to a type of Ethernet cable where the four wire pairs within the cable are connected to the same pin on each end. This means that the wires are not crossed or twisted with each other. Straight-through cables are commonly used to connect devices such as computers to switches or routers.
23.
Which of the following is not the External Security Threats?
Correct Answer
C. Underground Threats
24.
Which of the following is/are Protocols of Application?
Correct Answer
D. All of above
Explanation
All of the given options, FTP, DNS, and Telnet, are protocols of application. FTP (File Transfer Protocol) is used for transferring files between computers on a network. DNS (Domain Name System) is responsible for translating domain names into IP addresses. Telnet is a network protocol that allows for remote login and control of a computer. Therefore, all of the options mentioned are protocols of application.
25.
MAC Address is the example of
Correct Answer
B. Data Link Layer
Explanation
A MAC address, also known as a Media Access Control address, is a unique identifier assigned to network interfaces for communications on a network. It is used at the Data Link Layer of the OSI model to control access to the physical network medium. The Data Link Layer is responsible for the reliable transmission of data between adjacent network nodes and the MAC address plays a crucial role in this process by identifying the source and destination of data packets within a local network. Therefore, the MAC address is an example of the Data Link Layer.
26.
What is the Demilitarized Zone?
Correct Answer
A. The area between firewall & connection to an external network
Explanation
The Demilitarized Zone (DMZ) is a network security measure that acts as a buffer zone between an organization's internal network (protected by a firewall) and the external network (usually the internet). It is designed to provide an additional layer of security by segregating and isolating potentially vulnerable systems from the rest of the network. The DMZ allows limited access to specific services and resources, while blocking direct access to the internal network, thereby reducing the risk of unauthorized access and potential attacks.
27.
Which of the following is correct in VLSM?
Correct Answer
A. Can have subnets of different sizes
Explanation
In Variable Length Subnet Masking (VLSM), it is possible to have subnets of different sizes. VLSM allows for the allocation of subnet masks with varying lengths, which means that subnets can be divided into smaller or larger subnets based on the network's requirements. This flexibility in subnet size allocation is one of the key advantages of VLSM, as it allows for efficient utilization of IP addresses and better network management.
28.
A _____ is a device that forwards packets between networks by processing the routing information included in the packet.
Correct Answer
C. Router
Explanation
A router is a device that forwards packets between networks by processing the routing information included in the packet. It examines the destination IP address of the packet and determines the best path for the packet to reach its destination. Routers are crucial in connecting different networks and directing traffic efficiently. They play a key role in ensuring that data packets are delivered to the correct destination in a network.
29.
Network congestion occurs
Correct Answer
A. In case of traffic overloading
Explanation
Network congestion occurs in case of traffic overloading. This means that when there is an excessive amount of data being transmitted through a network, it can lead to congestion. This congestion can result in slower data transfer speeds, packet loss, and overall degradation of network performance. Therefore, the correct answer is "in case of traffic overloading".
30.
Which of these is not a guided media?
Correct Answer
C. Wireless LAN
Explanation
Wireless LAN is not a guided media because it does not require physical cables to transmit data. Instead, it uses wireless signals to transmit data over the air. In contrast, fiber optical cable, coaxial cable, and copper wire are all examples of guided media as they use physical cables to transmit data.