Quiznetik
Computer Networking (CN) | Set 1
1. Third generation of firewall offers_ to prevent web fingerprint attacks.
A. web application firewall
B. packet filter
C. stateful filter
D. none of them
Correct : A. web application firewall
2. The identity management system binds logical addresses to for reputed servers.
A. mac address
B. specific programs
C. other computers
D. none of them
Correct : A. mac address
3. IPS in firewall stands for .
A. intrusion protection system
B. intrusion prevention software
C. internet prevention system
D. intrusion prevention system
Correct : D. intrusion prevention system
4. Third generation firewalls were otherwise called .
A. packet filters
B. stateful filters
C. application filters
D. none of them
Correct : C. application filters
5. Second generation firewalls were otherwise called .
A. packet filters
B. stateful filters
C. application filters
D. none of them
Correct : B. stateful filters
6. First generation firewalls were otherwise called .
A. packet filters
B. stateful filters
C. application filters
D. none of them
Correct : A. packet filters
7. Third general firewalls operated at layer of the OSI model.
A. 3
B. 4
C. 5
D. 7
Correct : D. 7
8. Second general firewalls operated at layer of the OSI model.
A. 3
B. 4
C. 5
D. 7
Correct : B. 4
9. First general firewalls operated at layer of the OSI model.
A. 3
B. 4
C. 5
D. 7
Correct : A. 3
10. Filtering connections and disallowing prohibited connections is carried out using .
A. modem
B. router
C. firewall
D. bridge
Correct : C. firewall
11. Connection to the Internet requires enforcement of security.
A. low
B. high
C. zero
D. no
Correct : B. high
12. The address 2001:db8:a0b:12f0::1 is formatted in .
A. ipv0
B. ipv2
C. ipv4
D. ipv6
Correct : D. ipv6
13. Internet is constituted of .
A. network of networks
B. hard disk
C. dvd
D. pen drive
Correct : A. network of networks
14. Computers and devices can be connected using technology to create a network.
A. wired
B. wireless
C. both a & b
D. neither a nor b
Correct : C. both a & b
15. Most of the wired network connections use .
A. optical fibre cable (ofc)
B. usb cable
C. pen drive
D. hard drive
Correct : A. optical fibre cable (ofc)
16. The port for connecting broadband cable to a computer is called .
A. ethernet port
B. registered jack 45 (rj-45)
C. both a & b
D. none of them
Correct : C. both a & b
17. Wireless network connections use technologies.
A. wireless fidelity (wifi)
B. bluetooth
C. both a & b
D. neither a nor b
Correct : C. both a & b
18. are the hardware devices that help the computer to connect to a network.
A. routers
B. modems
C. wireless modems
D. all of them
Correct : D. all of them
19. MODEM stands for .
A. modulation democracy
B. modulation demodulation
C. modern demodulation
D. moderate demodulation
Correct : B. modulation demodulation
20. Routers help in .
A. transmission of data between networks
B. connecting different devices using appropriate protocol
C. both a & b
D. neither a nor b
Correct : C. both a & b
21. IP address helps to a computer connected to a network.
A. uniquely identify
B. format
C. reset
D. reject
Correct : A. uniquely identify
22. Port number on a computer host connected to a network denotes a .
A. background server program
B. client program
C. both a & b
D. none of them
Correct : C. both a & b
23. A program which runs in the background and sends results requested by a client is called a .
A. server
B. client
C. port
D. ip address
Correct : A. server
24. Firewall can .
A. deny access to specific sites
B. allow access to only white listed sites
C. both a & b
D. none of them
Correct : C. both a & b
25. Firewall can be implemented through .
A. hardware
B. software
C. both a & b
D. none of them
Correct : C. both a & b
26. The design adopted for connecting several hosts on a network is called .
A. telephony
B. wiring
C. connection
D. topology
Correct : D. topology
27. When 2 devices are connected through a dedicated line, it is topology.
A. point to point
B. bus
C. star
D. ring
Correct : A. point to point
28. When all nodes are connected to a central hub, it is topology.
A. point to point
B. bus
C. star
D. ring
Correct : C. star
29. Usually, the network connecting hosts inside a single building is called .
A. lan
B. wan
C. man
D. none of them
Correct : A. lan
30. Usually, the network connecting hosts located in several cities or nations is called .
A. lan
B. wan
C. man
D. none of them
Correct : B. wan
31. When network hosts are connected without wires, protocol is used.
A. lan
B. wan
C. man
D. wlan
Correct : D. wlan
32. MODEM is a device used for converting .
A. digital signal to analog
B. analog signal to digital
C. both a & b
D. neither a nor b
Correct : C. both a & b
33. MODEM is used to convey data over .
A. air
B. telephone line
C. train track
D. bus route
Correct : B. telephone line
34. Hub is to switch/ bridge since it repeats data even to the unwanted connections.
A. inferior
B. superior
C. equivalent
D. none of them
Correct : A. inferior
35. Switch is to a hub since unwanted repetitions are curtailed.
A. inferior
B. superior
C. equivalent
D. none of them
Correct : B. superior
36. The device which connects one Local Area Network to another Local Area Network is called
A. hub
B. switch
C. modem
D. bridge
Correct : D. bridge
37. A cable with single copper core and braided metal shield is called .
A. unshielded twisted cable
B. shielded twisted cable
C. coaxial cable
D. fibre optic cable
Correct : C. coaxial cable
38. Fibre optic cables are interferences from electric cables and electromagnetic waves.
A. prone to
B. unaffected by
C. susceptible to
D. affected by
Correct : B. unaffected by
39. Wireless networks communicate using signal instead of cables.
A. infrared
B. low frequency radio wave
C. wireless fidelity (wifi - ieee 802.11 standard)
D. all of them
Correct : D. all of them
40. In the modern days, is the best choice for wireless networking.
A. wifi
B. infrared
C. radio waves
D. micro-wave
Correct : A. wifi
41. Wireless networks are wired networks.
A. slower than
B. faster than
C. as fast as
D. none of them
Correct : A. slower than
42. In terms of data safety, wireless networks are wired networks.
A. more secure than
B. less secure than
C. as safe as
D. none of them
Correct : B. less secure than
43. Normally, WiFi signal reach m distance.
A. 50 to 100m
B. 1 to 2m
C. 0.5 to 1.0m
D. 2 to 3m
Correct : A. 50 to 100m
44. WiFi networks have for connecting.
A. name
B. password
C. both a & b
D. none of them
Correct : C. both a & b
45. Name of a WiFi network may be .
A. visible
B. invisible
C. both a & b
D. none of them
Correct : C. both a & b
46. Open WiFi networks have .
A. a visible name
B. no password
C. visible name without any password
D. none of them
Correct : D. none of them
47. The network established using Bluetooth technology is called a .
A. local area network (lan)
B. wide area network (wan)
C. metropolitan area network (man)
D. personal area network (pan)
Correct : D. personal area network (pan)
48. Bluetooth permits .
A. pairing by acceptance
B. pairing by password authentication
C. pairing by verification
D. all of them
Correct : D. all of them
49. UDP stands for .
A. unified datagram protocol
B. user datagram protocol
C. user datagram procedure
D. user digital protocol
Correct : B. user datagram protocol
50. allows for mapping IP address to an ethernet or hardware address.
A. address resolution protocol (arp)
B. reverse address resolution protocol (rarp)
C. open system interconnection (osi)
D. none of them
Correct : A. address resolution protocol (arp)
51. is the version of Internet Protocol now being phased out.
A. ip version 1 (ipv1)
B. ip version 2 (ipv2)
C. ip version 4 (ipv4)
D. ip version 6 (ipv6)
Correct : C. ip version 4 (ipv4)
52. IPV4 addresses have a by numeric address.
A. 4
B. 6
C. 8
D. 16
Correct : A. 4
53. In a client server network, the ports in the range of 0 to 1023 are called ports.
A. relational ports
B. general ports
C. well known ports
D. user ports
Correct : C. well known ports
54. Network protocols are standardized through .
A. request for comment (rfc)
B. email
C. web server
D. telnet
Correct : A. request for comment (rfc)
55. RFC in networking stands for .
A. rejection for comment
B. request for comment
C. request for contest
D. request freight comment
Correct : B. request for comment
56. TCP/IP port number 7 is assigned for protocol.
A. daytime
B. echo
C. quote of the day
D. message send
Correct : B. echo
57. TCP/IP port number 13 is assigned for protocol.
A. daytime
B. echo
C. quote of the day
D. message send
Correct : A. daytime
58. TCP/IP port number 17 is assigned for protocol.
A. daytime
B. echo
C. quote of the day
D. message send
Correct : C. quote of the day
59. TCP/IP port number 18 is assigned for protocol.
A. daytime
B. echo
C. quote of the day
D. message send
Correct : D. message send
60. TCP/IP port number 20 is assigned for .
A. telnet
B. simple mail transfer protocol (smtp)
C. file transfer protocol protocol (ftp)
D. trivial file transfer protocol (tftp)
Correct : C. file transfer protocol protocol (ftp)
61. TCP/IP port number 23 is assigned for .
A. telnet
B. simple mail transfer protocol (smtp)
C. file transfer protocol protocol (ftp)
D. trivial file transfer protocol (tftp)
Correct : A. telnet
62. TCP/IP port number 25 is assigned for .
A. telnet
B. simple mail transfer protocol (smtp)
C. file transfer protocol protocol (ftp)
D. trivial file transfer protocol (tftp)
Correct : B. simple mail transfer protocol (smtp)
63. TCP/IP port number 69 is assigned for .
A. telnet
B. simple mail transfer protocol (smtp)
C. file transfer protocol protocol (ftp)
D. trivial file transfer protocol (tftp)
Correct : D. trivial file transfer protocol (tftp)
64. TCP/IP port number 80 is assigned for .
A. hyper text transfer protocol (http)
B. post office protocol (pop)
C. structured query language (sql)
D. network news transfer protocol (nntp)
Correct : A. hyper text transfer protocol (http)
65. TCP/IP port number 109 is assigned for .
A. hyper text transfer protocol (http)
B. post office protocol (pop)
C. structured query language (sql)
D. network news transfer protocol (nntp)
Correct : B. post office protocol (pop)
66. TCP/IP port number 118/ 156 is assigned for .
A. hyper text transfer protocol (http)
B. post office protocol (pop)
C. structured query language (sql)
D. network news transfer protocol (nntp)
Correct : C. structured query language (sql)
67. TCP/IP port number 119/ 443 is assigned for .
A. hyper text transfer protocol (http)
B. post office protocol (pop)
C. structured query language (sql)
D. network news transfer protocol (nntp)
Correct : D. network news transfer protocol (nntp)
68. TCP/IP port number 143/ 220 is assigned for .
A. internet message access protocol (imap)
B. simple network management protocol (snmp)
C. internet relay chat (irc)
D. precision time protocol (ptp)
Correct : A. internet message access protocol (imap)
69. TCP/IP port number 161 is assigned for .
A. internet message access protocol (imap)
B. simple network management protocol (snmp)
C. internet relay chat (irc)
D. precision time protocol (ptp)
Correct : B. simple network management protocol (snmp)
70. TCP/IP port number 443 is assigned for .
A. http over secure socket layer https
B. remote procedure call (rpc)
C. dynamic host configuration protocol (dhcp)
D. internet message access protocol over secure socket layer (imaps)
Correct : A. http over secure socket layer https
71. TCP/IP port number 530 is assigned for .
A. http over secure socket layer https
B. remote procedure call (rpc)
C. dynamic host configuration protocol (dhcp)
D. internet message access protocol over secure socket layer (imaps)
Correct : B. remote procedure call (rpc)
72. TCP/IP port number 546/ 547 is assigned for .
A. http over secure socket layer https
B. remote procedure call (rpc)
C. dynamic host configuration protocol (dhcp)
D. internet message access protocol over secure socket layer (imaps)
Correct : C. dynamic host configuration protocol (dhcp)
73. TCP/IP port number 993 is assigned for .
A. http over secure socket layer https
B. remote procedure call (rpc)
C. dynamic host configuration protocol (dhcp)
D. internet message access protocol over secure socket layer (imaps)
Correct : D. internet message access protocol over secure socket layer (imaps)
74. The FTP server which does not require login process is called .
A. hyper text transmission protocol
B. simple mail transfer protocol
C. network time protocol
D. anonymous file transfer protocol
Correct : D. anonymous file transfer protocol
75. Using FTP, a file can be copied from remote system to the local system using the command .
A. get
B. put
C. cd
D. lcd
Correct : A. get
76. Using FTP, a file can be copied from local host to remote host using the command .
A. get
B. put
C. cd
D. lcd
Correct : B. put
77. Using FTP, working directory on the remote host can be changed using the command .
A. pwd
B. put
C. cd
D. lcd
Correct : C. cd
78. Using FTP, working directory on the local host can be changed using the command .
A. pwd
B. bye
C. cd
D. lcd
Correct : D. lcd
79. Using FTP, list of files on the remote host can be viewed using the command .
A. pwd
B. bye
C. cd
D. lcd
Correct : A. pwd
80. Using FTP, a file on the remote host may be deleted using the command .
A. delete
B. bye
C. cd
D. lcd
Correct : A. delete
81. Using FTP, connection to remote FTP server may be terminated using the command .
A. delete
B. bye/ quit
C. cd
D. lcd
Correct : B. bye/ quit
82. Popular FTP clients are .
A. coreftp
B. fireftp
C. filezilla
D. all of them
Correct : D. all of them
83. Usually, telnet connection is established using command followed by name of host.
A. ftp
B. telnet
C. ping
D. ls
Correct : B. telnet
84. In networking, MAC stands for .
A. media address control
B. machine access control
C. media access contact
D. media access control
Correct : D. media access control
85. Logical address of a host connected to a network is otherwise called address.
A. ip address
B. ip version 4 address
C. ip version 6 address
D. all of them
Correct : D. all of them
86. The addresses of class A network has subnet mask of .
A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. none of them
Correct : A. 255.0.0.0
87. The addresses of class B network has subnet mask of .
A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. none of them
Correct : B. 255.255.0.0
88. The addresses of class C network has subnet mask of .
A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. none of them
Correct : C. 255.255.255.0
89. First byte of class A network is in the range of .
A. 1 - 126
B. 128 – 191
C. 192 - 223
D. none of them
Correct : A. 1 - 126
90. First byte of class B network is in the range of .
A. 1 - 126
B. 128 – 191
C. 192 - 223
D. none of them
Correct : B. 128 – 191
91. First byte of class C network is in the range of .
A. 1 - 126
B. 128 – 191
C. 192 - 223
D. none of them
Correct : C. 192 - 223
92. Each class A network supports hosts.
A. 1,67,77,214
B. 65,534
C. 254
D. none of them
Correct : A. 1,67,77,214
93. Each class B network supports hosts.
A. 1,67,77,214
B. 65,534
C. 254
D. none of them
Correct : B. 65,534
94. IPV4 has got_ bits for addressing of hosts.
A. 128
B. 64
C. 32
D. 16
Correct : C. 32
95. IPV6 has got bits for addressing of hosts.
A. 128
B. 64
C. 32
D. 16
Correct : A. 128
96. IPV4 has got bytes for addressing of hosts.
A. 16
B. 8
C. 4
D. 2
Correct : C. 4
97. IPV6 has got bytes for addressing of hosts.
A. 16
B. 8
C. 4
D. 2
Correct : A. 16