Home
Categories
Technology
Health
Education
Business
Lifestyle
News
Food & Reicipe
Entertainment
Travels and Tourism
Notes
Mock Test
Tools
Submit Study Materials
Pricing
About
Contact
Register
Login
5. Concept of Computer Network and Network Security System (ACtE05)
1. Which of the following is a networking model that defines a set of protocols to enable communication between devices?
OSI Model
TCP/IP Model
Both a and b
None of the above
2. Which layer of the OSI model is responsible for end-to-end communication and error handling?
Transport Layer
Network Layer
Data Link Layer
Application Layer
3. Which device operates at the Data Link Layer and is used to connect multiple devices within a LAN?
Router
Switch
Hub
Bridge
4. Which of the following is a type of transmission media used in computer networks?
Fiber Optic Cable
Coaxial Cable
Twisted Pair Cable
All of the above
5. Which protocol is used for error detection and correction in the Data Link Layer?
ARP
PPP
Ethernet
CRC
6. Which of the following is a multiple access protocol used in Ethernet networks?
CSMA/CD
Token Passing
Polling
ALOHA
7. What is the purpose of the Address Resolution Protocol (ARP)?
To map IP addresses to MAC addresses
To resolve domain names to IP addresses
To establish a connection between devices
To encrypt data for secure transmission
8. Which IEEE standard defines the specifications for Ethernet?
802.3
802.4
802.5
802.11
9. Which of the following is a classful IP address?
192.168.1.1
10.0.0.1
172.16.0.1
224.0.0.1
10. What is the purpose of subnetting in networking?
To divide a network into smaller, manageable segments
To assign IP addresses to devices
To establish a connection between devices
To encrypt data for secure transmission
11. Which routing protocol uses the Bellman-Ford algorithm to determine the best path?
RIP
OSPF
BGP
EIGRP
12. Which of the following is a link-state routing protocol?
RIP
OSPF
BGP
EIGRP
13. Which transport layer protocol is connection-oriented?
UDP
TCP
IP
ICMP
14. What is the purpose of flow control in the transport layer?
To manage the rate of data transmission between sender and receiver
To establish a connection between devices
To route data packets to their destination
To encrypt data for secure transmission
15. Which of the following is a port number used by the HTTP protocol?
21
22
80
443
16. What is the main difference between TCP and UDP?
TCP is connection-oriented, while UDP is connectionless
TCP is faster than UDP
UDP is more reliable than TCP
TCP uses IP addresses, while UDP uses MAC addresses
17. Which protocol is used for secure web communication?
HTTP
FTP
HTTPS
SMTP
18. Which of the following is a file transfer protocol?
HTTP
FTP
SMTP
DNS
19. What is the purpose of the Domain Name System (DNS)?
To translate domain names into IP addresses
To encrypt data for secure transmission
To establish a connection between devices
To manage email communications
20. Which of the following is a peer-to-peer application?
HTTP
FTP
BitTorrent
SMTP
21. Which of the following is a type of security attack?
Phishing
Denial of Service (DoS)
Man-in-the-Middle (MitM)
All of the above
22. What is the purpose of the RSA algorithm in cryptography?
To encrypt data using a symmetric key
To generate public and private keys for asymmetric encryption
To hash data for integrity verification
To establish a secure connection between devices
23. Which protocol is used to secure email communications?
SMTP
POP3
IMAP
PGP
24. What is the purpose of a firewall in network security?
To monitor and control incoming and outgoing network traffic based on predetermined security rules
To encrypt data for secure transmission
To establish a connection between devices
To manage email communications
25. Which of the following is a layer of the OSI model?
Transport Layer
Network Layer
Data Link Layer
All of the above
26. Which of the following is used to connect different networks together?
Router
Switch
Hub
Bridge
27. Which layer of the OSI model is responsible for routing packets?
Transport Layer
Network Layer
Data Link Layer
Application Layer
28. Which of the following protocols is used for email communication?
HTTP
FTP
SMTP
DNS
29. What does the IP protocol stand for?
Internet Protocol
Internet Package
Information Protocol
Internal Packet
30. Which protocol is used for file transfer between computers?
FTP
HTTP
POP3
IMAP
31. Which of the following is a network layer protocol?
TCP
IP
UDP
ARP
32. What is the purpose of the IP address in networking?
Identifies a device on a network
Provides encryption for data
Ensures data integrity
Manages network traffic
33. What is the main purpose of a switch in a network?
To route data packets to the correct device
To encrypt data for secure transmission
To filter and forward data between devices
To manage the connection between devices
34. Which of the following is used to detect errors in the Data Link Layer?
ARP
PPP
CRC
Ethernet
35. Which of the following is a characteristic of IPv6?
It uses 32-bit addressing
It supports multicast communication
It has a 128-bit address space
It uses private addressing only
36. Which of the following is an example of a session layer protocol?
HTTP
FTP
NetBIOS
SMTP
37. Which device operates at the Network Layer of the OSI model?
Router
Switch
Hub
Bridge
38. What does TCP stand for in the context of network communication?
Transmission Control Protocol
Terminal Communication Protocol
Transmission Connection Protocol
Terminal Control Protocol
39. Which of the following is an example of a Layer 3 device?
Switch
Router
Hub
Repeater
40. What is the function of DNS in networking?
To translate domain names into IP addresses
To secure the communication channels
To route data packets
To provide email services
41. What is the default port number for HTTPS?
443
80
21
25
42. Which of the following is used to secure email messages?
SSL
PGP
IPsec
HTTPS
43. Which of the following protocols ensures secure communication in wireless networks?
WPA
WEP
SSL
IPsec
44. What is the purpose of the SSL/TLS protocol?
To encrypt data during transmission
To secure passwords only
To filter incoming network traffic
To route packets to their destination
45. What is the function of a VPN in networking?
To provide encryption for data transmission
To ensure error-free communication
To route data packets between devices
To assign IP addresses to devices
46. Which protocol is used to route data packets between networks?
IP
HTTP
ARP
DNS
47. Which of the following is a connectionless transport layer protocol?
TCP
UDP
IP
ICMP
48. Which device operates at the OSI model's Physical Layer?
Hub
Router
Switch
Bridge
49. What is the function of the ICMP protocol?
To provide reliable communication
To manage data flow in a network
To report errors and provide diagnostic functions
To route packets
50. Which of the following protocols is used for sending emails?
HTTP
SMTP
FTP
POP3
51. Which of the following is used to resolve domain names into IP addresses?
DNS
DHCP
ARP
PPP
52. What is the function of the transport layer?
To establish, maintain, and terminate communication sessions
To manage data flow between devices
To route packets across networks
To translate IP addresses to MAC addresses
53. What is the maximum length of an Ethernet frame?
1000 bytes
1500 bytes
2048 bytes
5000 bytes
54. Which of the following protocols is used for secure file transfer?
FTP
SFTP
HTTP
IMAP
55. Which layer of the OSI model is responsible for logical addressing?
Application Layer
Transport Layer
Network Layer
Data Link Layer
56. What is the function of the Address Resolution Protocol (ARP)?
To resolve IP addresses to MAC addresses
To assign IP addresses to devices
To manage IP address allocation
To provide routing information
57. Which protocol is used to secure data communication in VPNs?
SSL/TLS
IPsec
PGP
HTTPS
58. Which device operates at the Application Layer of the OSI model?
Router
Switch
Gateway
Web Browser
59. What is the purpose of the CSMA/CD protocol in Ethernet networks?
To prevent data collision
To resolve IP addresses
To ensure error-free transmission
To manage bandwidth allocation
60. What is the purpose of a network firewall?
To monitor and control network traffic
To route packets between networks
To manage DNS queries
To filter out malicious IP addresses
61. Which of the following is used to control data flow between sender and receiver?
Flow Control
Multiplexing
Error Detection
Routing
62. Which type of network topology is known for its redundancy and reliability?
Bus
Star
Mesh
Ring
63. Which of the following is an example of a dynamic routing protocol?
RIP
OSPF
BGP
All of the above
64. Which of the following is a secure version of HTTP?
HTTP
FTP
HTTPS
SNMP
65. What is the function of a router in a network?
To filter data between devices
To route data packets between networks
To encrypt communication
To manage file transfer
66. What does VPN stand for?
Virtual Private Network
Virtual Public Network
Verified Private Network
Virtual Protocol Network
67. Which of the following is a networking model that defines a set of protocols to enable communication between devices?
OSI Model
TCP/IP Model
Both a and b
None of the above
68. Which layer of the OSI model is responsible for end-to-end communication and error handling?
Transport Layer
Network Layer
Data Link Layer
Application Layer
69. Which device operates at the Data Link Layer and is used to connect multiple devices within a LAN?
Router
Switch
Hub
Bridge
70. Which of the following is a type of transmission media used in computer networks?
Fiber Optic Cable
Coaxial Cable
Twisted Pair Cable
All of the above
71. Which protocol is used for error detection and correction in the Data Link Layer?
ARP
PPP
Ethernet
CRC
72. Which of the following is a multiple access protocol used in Ethernet networks?
CSMA/CD
Token Passing
Polling
ALOHA
73. What is the purpose of the Address Resolution Protocol (ARP)?
To map IP addresses to MAC addresses
To resolve domain names to IP addresses
To establish a connection between devices
To encrypt data for secure transmission
74. Which IEEE standard defines the specifications for Ethernet?
802.3
802.4
802.5
802.11
75. Which of the following is a classful IP address?
192.168.1.1
10.0.0.1
172.16.0.1
224.0.0.1
76. What is the purpose of subnetting in networking?
To divide a network into smaller, manageable segments
To assign IP addresses to devices
To establish a connection between devices
To encrypt data for secure transmission
77. Which routing protocol uses the Bellman-Ford algorithm to determine the best path?
RIP
OSPF
BGP
EIGRP
78. Which of the following is a link-state routing protocol?
RIP
OSPF
BGP
EIGRP
79. Which transport layer protocol is connection-oriented?
UDP
TCP
IP
ICMP
80. What is the purpose of flow control in the transport layer?
To manage the rate of data transmission between sender and receiver
To establish a connection between devices
To route data packets to their destination
To encrypt data for secure transmission
81. Which of the following is a port number used by the HTTP protocol?
21
22
80
443
82. What is the main difference between TCP and UDP?
TCP is connection-oriented, while UDP is connectionless
TCP is faster than UDP
UDP is more reliable than TCP
TCP uses IP addresses, while UDP uses MAC addresses
83. Which protocol is used for secure web communication?
HTTP
FTP
HTTPS
SMTP
84. Which of the following is a file transfer protocol?
HTTP
FTP
SMTP
DNS
85. What is the purpose of the Domain Name System (DNS)?
To translate domain names into IP addresses
To encrypt data for secure transmission
To establish a connection between devices
To manage email communications
86. Which of the following is a peer-to-peer application?
HTTP
FTP
BitTorrent
SMTP
87. Which of the following is a type of security attack?
Phishing
Denial of Service (DoS)
Man-in-the-Middle (MitM)
All of the above
88. What is the purpose of the RSA algorithm in cryptography?
To encrypt data using a symmetric key
To generate public and private keys for asymmetric encryption
To hash data for integrity verification
To establish a secure connection between devices
89. Which protocol is used to secure email communications?
SMTP
POP3
IMAP
PGP
90. What is the purpose of a firewall in network security?
To monitor and control incoming and outgoing network traffic based on predetermined security rules
To encrypt data for secure transmission
To establish a connection between devices
To manage email communications
91. Which of the following is a networking model that defines a set of protocols to enable communication between devices?
OSI Model
TCP/IP Model
Both a and b
None of the above
92. Which layer of the OSI model is responsible for end-to-end communication and error handling?
Transport Layer
Network Layer
Data Link Layer
Application Layer
93. Which device operates at the Data Link Layer and is used to connect multiple devices within a LAN?
Router
Switch
Hub
Bridge
94. Which of the following is a type of transmission media used in computer networks?
Fiber Optic Cable
Coaxial Cable
Twisted Pair Cable
All of the above
95. Which protocol is used for error detection and correction in the Data Link Layer?
ARP
PPP
Ethernet
CRC
96. Which of the following is a multiple access protocol used in Ethernet networks?
CSMA/CD
Token Passing
Polling
ALOHA
97. What is the purpose of the Address Resolution Protocol (ARP)?
To map IP addresses to MAC addresses
To resolve domain names to IP addresses
To establish a connection between devices
To encrypt data for secure transmission
98. Which IEEE standard defines the specifications for Ethernet?
802.3
802.4
802.5
802.11
99. Which of the following is a classful IP address?
192.168.1.1
10.0.0.1
172.16.0.1
224.0.0.1
100. What is the purpose of subnetting in networking?
To divide a network into smaller, manageable segments
To assign IP addresses to devices
To establish a connection between devices
To encrypt data for secure transmission
101. Which routing protocol uses the Bellman-Ford algorithm to determine the best path?
RIP
OSPF
BGP
EIGRP
102. Which of the following is a link-state routing protocol?
RIP
OSPF
BGP
EIGRP
103. Which transport layer protocol is connection-oriented?
UDP
TCP
IP
ICMP
104. What is the purpose of flow control in the transport layer?
To manage the rate of data transmission between sender and receiver
To establish a connection between devices
To route data packets to their destination
To encrypt data for secure transmission
105. Which of the following is a port number used by the HTTP protocol?
21
22
80
443
106. What is the main difference between TCP and UDP?
TCP is connection-oriented, while UDP is connectionless
TCP is faster than UDP
UDP is more reliable than TCP
TCP uses IP addresses, while UDP uses MAC addresses
107. Which protocol is used for secure web communication?
HTTP
FTP
HTTPS
SMTP
108. Which of the following is a file transfer protocol?
HTTP
FTP
SMTP
DNS
109. What is the purpose of the Domain Name System (DNS)?
To translate domain names into IP addresses
To encrypt data for secure transmission
To establish a connection between devices
To manage email communications
110. Which of the following is a peer-to-peer application?
HTTP
FTP
BitTorrent
SMTP
111. Which of the following is a type of security attack?
Phishing
Denial of Service (DoS)
Man-in-the-Middle (MitM)
All of the above
112. What is the purpose of the RSA algorithm in cryptography?
To encrypt data using a symmetric key
To generate public and private keys for asymmetric encryption
To hash data for integrity verification
To establish a secure connection between devices
113. Which protocol is used to secure email communications?
SMTP
POP3
IMAP
PGP
114. What is the purpose of a firewall in network security?
To monitor and control incoming and outgoing network traffic based on predetermined security rules
To encrypt data for secure transmission
To establish a connection between devices
To manage email communications
Check Score
Results