5. Concept of Computer Network and Network Security System (ACtE05)

1. Which of the following is a networking model that defines a set of protocols to enable communication between devices?

2. Which layer of the OSI model is responsible for end-to-end communication and error handling?

3. Which device operates at the Data Link Layer and is used to connect multiple devices within a LAN?

4. Which of the following is a type of transmission media used in computer networks?

5. Which protocol is used for error detection and correction in the Data Link Layer?

6. Which of the following is a multiple access protocol used in Ethernet networks?

7. What is the purpose of the Address Resolution Protocol (ARP)?

8. Which IEEE standard defines the specifications for Ethernet?

9. Which of the following is a classful IP address?

10. What is the purpose of subnetting in networking?

11. Which routing protocol uses the Bellman-Ford algorithm to determine the best path?

12. Which of the following is a link-state routing protocol?

13. Which transport layer protocol is connection-oriented?

14. What is the purpose of flow control in the transport layer?

15. Which of the following is a port number used by the HTTP protocol?

16. What is the main difference between TCP and UDP?

17. Which protocol is used for secure web communication?

18. Which of the following is a file transfer protocol?

19. What is the purpose of the Domain Name System (DNS)?

20. Which of the following is a peer-to-peer application?

21. Which of the following is a type of security attack?

22. What is the purpose of the RSA algorithm in cryptography?

23. Which protocol is used to secure email communications?

24. What is the purpose of a firewall in network security?

25. Which of the following is a layer of the OSI model?

26. Which of the following is used to connect different networks together?

27. Which layer of the OSI model is responsible for routing packets?

28. Which of the following protocols is used for email communication?

29. What does the IP protocol stand for?

30. Which protocol is used for file transfer between computers?

31. Which of the following is a network layer protocol?

32. What is the purpose of the IP address in networking?

33. What is the main purpose of a switch in a network?

34. Which of the following is used to detect errors in the Data Link Layer?

35. Which of the following is a characteristic of IPv6?

36. Which of the following is an example of a session layer protocol?

37. Which device operates at the Network Layer of the OSI model?

38. What does TCP stand for in the context of network communication?

39. Which of the following is an example of a Layer 3 device?

40. What is the function of DNS in networking?

41. What is the default port number for HTTPS?

42. Which of the following is used to secure email messages?

43. Which of the following protocols ensures secure communication in wireless networks?

44. What is the purpose of the SSL/TLS protocol?

45. What is the function of a VPN in networking?

46. Which protocol is used to route data packets between networks?

47. Which of the following is a connectionless transport layer protocol?

48. Which device operates at the OSI model's Physical Layer?

49. What is the function of the ICMP protocol?

50. Which of the following protocols is used for sending emails?

51. Which of the following is used to resolve domain names into IP addresses?

52. What is the function of the transport layer?

53. What is the maximum length of an Ethernet frame?

54. Which of the following protocols is used for secure file transfer?

55. Which layer of the OSI model is responsible for logical addressing?

56. What is the function of the Address Resolution Protocol (ARP)?

57. Which protocol is used to secure data communication in VPNs?

58. Which device operates at the Application Layer of the OSI model?

59. What is the purpose of the CSMA/CD protocol in Ethernet networks?

60. What is the purpose of a network firewall?

61. Which of the following is used to control data flow between sender and receiver?

62. Which type of network topology is known for its redundancy and reliability?

63. Which of the following is an example of a dynamic routing protocol?

64. Which of the following is a secure version of HTTP?

65. What is the function of a router in a network?

66. What does VPN stand for?

67. Which of the following is a networking model that defines a set of protocols to enable communication between devices?

68. Which layer of the OSI model is responsible for end-to-end communication and error handling?

69. Which device operates at the Data Link Layer and is used to connect multiple devices within a LAN?

70. Which of the following is a type of transmission media used in computer networks?

71. Which protocol is used for error detection and correction in the Data Link Layer?

72. Which of the following is a multiple access protocol used in Ethernet networks?

73. What is the purpose of the Address Resolution Protocol (ARP)?

74. Which IEEE standard defines the specifications for Ethernet?

75. Which of the following is a classful IP address?

76. What is the purpose of subnetting in networking?

77. Which routing protocol uses the Bellman-Ford algorithm to determine the best path?

78. Which of the following is a link-state routing protocol?

79. Which transport layer protocol is connection-oriented?

80. What is the purpose of flow control in the transport layer?

81. Which of the following is a port number used by the HTTP protocol?

82. What is the main difference between TCP and UDP?

83. Which protocol is used for secure web communication?

84. Which of the following is a file transfer protocol?

85. What is the purpose of the Domain Name System (DNS)?

86. Which of the following is a peer-to-peer application?

87. Which of the following is a type of security attack?

88. What is the purpose of the RSA algorithm in cryptography?

89. Which protocol is used to secure email communications?

90. What is the purpose of a firewall in network security?

91. Which of the following is a networking model that defines a set of protocols to enable communication between devices?

92. Which layer of the OSI model is responsible for end-to-end communication and error handling?

93. Which device operates at the Data Link Layer and is used to connect multiple devices within a LAN?

94. Which of the following is a type of transmission media used in computer networks?

95. Which protocol is used for error detection and correction in the Data Link Layer?

96. Which of the following is a multiple access protocol used in Ethernet networks?

97. What is the purpose of the Address Resolution Protocol (ARP)?

98. Which IEEE standard defines the specifications for Ethernet?

99. Which of the following is a classful IP address?

100. What is the purpose of subnetting in networking?

101. Which routing protocol uses the Bellman-Ford algorithm to determine the best path?

102. Which of the following is a link-state routing protocol?

103. Which transport layer protocol is connection-oriented?

104. What is the purpose of flow control in the transport layer?

105. Which of the following is a port number used by the HTTP protocol?

106. What is the main difference between TCP and UDP?

107. Which protocol is used for secure web communication?

108. Which of the following is a file transfer protocol?

109. What is the purpose of the Domain Name System (DNS)?

110. Which of the following is a peer-to-peer application?

111. Which of the following is a type of security attack?

112. What is the purpose of the RSA algorithm in cryptography?

113. Which protocol is used to secure email communications?

114. What is the purpose of a firewall in network security?