Quiznetik

Computer Networking (CN) | Set 1

1. Third generation of firewall offers_ to prevent web fingerprint attacks.

Correct : A. web application firewall

2. The identity management system binds logical addresses to for reputed servers.

Correct : A. mac address

3. IPS in firewall stands for .

Correct : D. intrusion prevention system

4. Third generation firewalls were otherwise called .

Correct : C. application filters

5. Second generation firewalls were otherwise called .

Correct : B. stateful filters

6. First generation firewalls were otherwise called .

Correct : A. packet filters

7. Third general firewalls operated at layer of the OSI model.

Correct : D. 7

8. Second general firewalls operated at layer of the OSI model.

Correct : B. 4

9. First general firewalls operated at layer of the OSI model.

Correct : A. 3

10. Filtering connections and disallowing prohibited connections is carried out using .

Correct : C. firewall

11. Connection to the Internet requires enforcement of security.

Correct : B. high

12. The address 2001:db8:a0b:12f0::1 is formatted in .

Correct : D. ipv6

13. Internet is constituted of .

Correct : A. network of networks

14. Computers and devices can be connected using technology to create a network.

Correct : C. both a & b

15. Most of the wired network connections use .

Correct : A. optical fibre cable (ofc)

16. The port for connecting broadband cable to a computer is called .

Correct : C. both a & b

17. Wireless network connections use technologies.

Correct : C. both a & b

18. are the hardware devices that help the computer to connect to a network.

Correct : D. all of them

19. MODEM stands for .

Correct : B. modulation demodulation

20. Routers help in .

Correct : C. both a & b

21. IP address helps to a computer connected to a network.

Correct : A. uniquely identify

22. Port number on a computer host connected to a network denotes a .

Correct : C. both a & b

23. A program which runs in the background and sends results requested by a client is called a .

Correct : A. server

24. Firewall can .

Correct : C. both a & b

25. Firewall can be implemented through .

Correct : C. both a & b

26. The design adopted for connecting several hosts on a network is called .

Correct : D. topology

27. When 2 devices are connected through a dedicated line, it is topology.

Correct : A. point to point

28. When all nodes are connected to a central hub, it is topology.

Correct : C. star

29. Usually, the network connecting hosts inside a single building is called .

Correct : A. lan

30. Usually, the network connecting hosts located in several cities or nations is called .

Correct : B. wan

31. When network hosts are connected without wires, protocol is used.

Correct : D. wlan

32. MODEM is a device used for converting .

Correct : C. both a & b

33. MODEM is used to convey data over .

Correct : B. telephone line

34. Hub is to switch/ bridge since it repeats data even to the unwanted connections.

Correct : A. inferior

35. Switch is to a hub since unwanted repetitions are curtailed.

Correct : B. superior

36. The device which connects one Local Area Network to another Local Area Network is called

Correct : D. bridge

37. A cable with single copper core and braided metal shield is called .

Correct : C. coaxial cable

38. Fibre optic cables are interferences from electric cables and electromagnetic waves.

Correct : B. unaffected by

39. Wireless networks communicate using signal instead of cables.

Correct : D. all of them

40. In the modern days, is the best choice for wireless networking.

Correct : A. wifi

41. Wireless networks are wired networks.

Correct : A. slower than

42. In terms of data safety, wireless networks are wired networks.

Correct : B. less secure than

43. Normally, WiFi signal reach m distance.

Correct : A. 50 to 100m

44. WiFi networks have for connecting.

Correct : C. both a & b

45. Name of a WiFi network may be .

Correct : C. both a & b

46. Open WiFi networks have .

Correct : D. none of them

47. The network established using Bluetooth technology is called a .

Correct : D. personal area network (pan)

48. Bluetooth permits .

Correct : D. all of them

49. UDP stands for .

Correct : B. user datagram protocol

50. allows for mapping IP address to an ethernet or hardware address.

Correct : A. address resolution protocol (arp)

51. is the version of Internet Protocol now being phased out.

Correct : C. ip version 4 (ipv4)

52. IPV4 addresses have a by numeric address.

Correct : A. 4

53. In a client server network, the ports in the range of 0 to 1023 are called ports.

Correct : C. well known ports

54. Network protocols are standardized through .

Correct : A. request for comment (rfc)

55. RFC in networking stands for .

Correct : B. request for comment

56. TCP/IP port number 7 is assigned for protocol.

Correct : B. echo

57. TCP/IP port number 13 is assigned for protocol.

Correct : A. daytime

58. TCP/IP port number 17 is assigned for protocol.

Correct : C. quote of the day

59. TCP/IP port number 18 is assigned for protocol.

Correct : D. message send

60. TCP/IP port number 20 is assigned for .

Correct : C. file transfer protocol protocol (ftp)

61. TCP/IP port number 23 is assigned for .

Correct : A. telnet

62. TCP/IP port number 25 is assigned for .

Correct : B. simple mail transfer protocol (smtp)

63. TCP/IP port number 69 is assigned for .

Correct : D. trivial file transfer protocol (tftp)

64. TCP/IP port number 80 is assigned for .

Correct : A. hyper text transfer protocol (http)

65. TCP/IP port number 109 is assigned for .

Correct : B. post office protocol (pop)

66. TCP/IP port number 118/ 156 is assigned for .

Correct : C. structured query language (sql)

67. TCP/IP port number 119/ 443 is assigned for .

Correct : D. network news transfer protocol (nntp)

68. TCP/IP port number 143/ 220 is assigned for .

Correct : A. internet message access protocol (imap)

69. TCP/IP port number 161 is assigned for .

Correct : B. simple network management protocol (snmp)

70. TCP/IP port number 443 is assigned for .

Correct : A. http over secure socket layer https

71. TCP/IP port number 530 is assigned for .

Correct : B. remote procedure call (rpc)

72. TCP/IP port number 546/ 547 is assigned for .

Correct : C. dynamic host configuration protocol (dhcp)

73. TCP/IP port number 993 is assigned for .

Correct : D. internet message access protocol over secure socket layer (imaps)

74. The FTP server which does not require login process is called .

Correct : D. anonymous file transfer protocol

75. Using FTP, a file can be copied from remote system to the local system using the command .

Correct : A. get

76. Using FTP, a file can be copied from local host to remote host using the command .

Correct : B. put

77. Using FTP, working directory on the remote host can be changed using the command .

Correct : C. cd

78. Using FTP, working directory on the local host can be changed using the command .

Correct : D. lcd

79. Using FTP, list of files on the remote host can be viewed using the command .

Correct : A. pwd

80. Using FTP, a file on the remote host may be deleted using the command .

Correct : A. delete

81. Using FTP, connection to remote FTP server may be terminated using the command .

Correct : B. bye/ quit

82. Popular FTP clients are .

Correct : D. all of them

83. Usually, telnet connection is established using command followed by name of host.

Correct : B. telnet

84. In networking, MAC stands for .

Correct : D. media access control

85. Logical address of a host connected to a network is otherwise called address.

Correct : D. all of them

86. The addresses of class A network has subnet mask of .

Correct : A. 255.0.0.0

87. The addresses of class B network has subnet mask of .

Correct : B. 255.255.0.0

88. The addresses of class C network has subnet mask of .

Correct : C. 255.255.255.0

89. First byte of class A network is in the range of .

Correct : A. 1 - 126

90. First byte of class B network is in the range of .

Correct : B. 128 – 191

91. First byte of class C network is in the range of .

Correct : C. 192 - 223

92. Each class A network supports hosts.

Correct : A. 1,67,77,214

93. Each class B network supports hosts.

Correct : B. 65,534

94. IPV4 has got_ bits for addressing of hosts.

Correct : C. 32

95. IPV6 has got bits for addressing of hosts.

Correct : A. 128

96. IPV4 has got bytes for addressing of hosts.

Correct : C. 4

97. IPV6 has got bytes for addressing of hosts.

Correct : A. 16