1. What does PoP stand for?
A. Pre Office Protocol
B. Post Office Protocol
C. Protocol of Post
D. None
Ans: Post Office Protocol
2. What is the port number of PoP?
A. 35
B. 43
C. 110
D. 25
Ans: 110
3. What is the number of layers in the OSI model?
A. 2 Layers
B. 4 Layers
C. 7 Layers
D. 9 Layers
Ans: 7 Layers
4. The full form of OSI is?
A. Operating System Interface
B. Optical System Interconnection
C. Operating System Internet
D. Open System Interconnection
Ans: Open System Interconnection
5. Identify the layer which provides service to the user.
A. Session Layer
B. Application Layer
C. Presentation Error
D. Physical Layer
Ans: Application Layer
6. What is a HUB?
A. Software
B. Computing Device
C. Network Device
D. Calculation Device
Ans: Network Device
7. What does a set of rules define?
A. SMTP
B. FTP
C. IMAP
D. Protocol
Ans: Protocol
8. Identify among the following which is mainly used to host
A. Mail Server
B. Webserver
C. Database Server
D. None
Ans: Webserver
9. Identify the full form of HTTP?
A. HyperText Transfer Protocol
B. HyperText Transfer Package
C. Hyper Transfer Text Package
D. Hyper Transfer Text Practice
Ans: HyperText Transfer Protocol
10. Identify the protocol primarily used for browsing data.
A. FTP
B. TCP
C. TFTP
D. HTTP
Ans: HTTP
11. Identify the total versions of IP.
A. 1
B. 2
C. 3
D. 4
Ans: 2
12. Identify the first network which was based on TCP/IP protocol.
A. ARPANET
B. HUB
C. Ethernet Card
D. Router
Ans: ARPANET
13. Choose among the following, which is the most common internet Protocol.
A. PPP
B. FTP
C. TCP/IP
D. SMTP
Ans: SMTP
14. What does TCP/IP stand for?
A. Telephone control protocol/Internet protocol.
B. Transmission control protocol/Internet protocol.
C. Transmission control protocol/International protocol.
D. None
Ans: Transmission control protocol/Internet protocol.
15. Which of the following layer isn’t present in the TCP/IP model but is included
in the OSI model?
A. Network Layer
B. session layer
C. Application Layer
D. Transport Layer
Ans: session layer
16. What is the collection of the hyperlinked document on the internet known as?
A. HTML
B. EMAIL
C. WWW
D. Internet
Ans: WWW
17. What is the location of a resource on the internet given by?
A. Email
B. IP
C. Protocol
D. URL
Ans: URL
18. Identify the incorrect network topology,
A. Bus
B. Star
C. P2P
D. Ring
Ans: P2P
19. Which of these is a standard interface for serial data transmission.
A. ASCII
B. RS232C
C. 2
D. Centronics
Ans: RS232C
20. Which type of topology is best suited for large businesses which must carefully
control and coordinate the operation of distributed branch outlets?
A. Ring
B. Local area
C. Hierarchical
D. Star
Ans: Star
21. Which of the following transmission directions listed is not a legitimate
channel?
A. Simplex
B. Half Duplex
C. Full Duplex
D. Double Duplex
Ans: Double Duplex
22. "Parity bits" are used for which of the following purposes?
A. Encryption of data
B. To transmit faster
C. To detect errors
D. To identify the user
Ans: To detect errors
23. What kind of transmission medium is most appropriate to carry data in a
computer network that is exposed to electrical interferences?
A. Unshielded twisted pair
B. Optical fiber
C. Coaxial cable
D. Microwave
Ans: Optical fiber
24. Which one of the following is a valid email address?
A. gmail.com
B. network@computer.com
C. computernetworks@.com
D. computernetworks@cn
Ans: network@computer.com
25. Which of the following best describes uploading information?
A. Sorting data on a disk drive
B. Sending information to a host computer
C. Receiving information from a host computer
D. Sorting data on a hard drive
Ans: Sending information to a host computer
26. At what speed does tele-computed refer?
A. Interface speed
B. Cycles per second
C. Baud rate
D. Megabyte load
Ans: Baud rate
27. Consider the following:
1. Twisted pair cables
2. Microwaves and Satellite Signals
3. Repeaters
4. Analog Transmissions
5. Fiber optics
Which of the above is consider as (a) signal transmission medium is data
communications?
A. (1) and (5)
B. (1) and (2)
C. (1) (2) and (5)
D. (1) (2) (3) and (5)
Ans: (1) (2) and (5)
28. The term WAN stands for?
A. Wide Area Net
B. Wide Access Network
C. Wide Area Network
D. Wide Access Net
Ans: Wide Area Network
29. Which of the following cannot be used as a medium for 802.3 ethernet?
A. A thin coaxial cable
B. A twisted pair cable
C. A microwave link
D. A fiber optical cable
Ans: A microwave link
30) What IP address class allocates 8 bits for the host identification part?
A. Class A
B. Class B
C. Class C
D. Class D
Ans: Class C
31. Which layer of the TCP / IP stack corresponds to the OSI model transport layer?
A. Host to host
B. Application
C. Internet
D. Network Access
Ans: Host to Host
32. On a simplex data link, which of the following is a possible error recovery
technique?
A. Backward error correction (BEC)
B. The use of hamming codes
C. Automatic Repeat Request (ARQ)
D. Downward error correction (DEC)
Ans: The use of hamming codes
33. Which of the statement is correct with regard to Time Division Multiplexing
(TDM) and its variants?
A. Statistical TDM makes efficient use of the bandwidth only if the arrival
pattern of the data stream is probabilistic.
B. TDM requires the transmitter and receiver to be synchronized periodically.
C. TDM performs efficiently if the arrival pattern of the data stream is
probabilistic.
D. Statistical TDM is efficient if the data stream is deterministic.
Ans: (a) and (b)
34. The term LAN stands for?
A. Local Area Net
B. Local Area Network
C. Local Array Network
D. Local Array Net
Ans: Local Area Network
35. Which of the through is share the data of two computer?
A. Library
B. Network
C. Grouping
D. Integrated system
Ans: Network
36. In specific, if the systems use separate protocols, which one of the following
devices is used to link two systems?
A. Repeater
B. Gateway
C. Bridge
D. Hub
Ans: Gateway
37. The private key in asymmetric key cryptography is kept by?
A. Sender
B. Receiver
C. Sender and Receiver
D. None of the these
Ans: Receiver
38. The correct order of corresponding OSI layers for having functionalities of
routing and reconciling machine representation differences with shared access
resolution and ASCII test protocol is?
A. Network, Physical, Transport, Data link
B. Network, Physical, Data link, Application
C. Network, Presentation, Data link, Application
D. Network, Presentation, Physical, Transport
Ans: Network, Presentation, Data link, Application
39. In which of the following switching methods, the message is divided into small
packets?
A. Message switching
B. Packet switching
C. Virtual switching
D. None of the these
Ans: Packet switching
40. Which of the following switch methods creates a point-to-point physical
connection between two or more computers?
A. Message switching
B. Packet switching
C. Circuit switching
D. None of the these
Ans: Circuit switching
41. What is the maximum data transfer rate of the optical fiber wire?
A. 50 kbps
B. 1000 kbps
C. 1000 Mbps
D. None of the these
Ans: 1000 Mbps
42. SLIP stands for _______
A. System line internet protocol
B. Serial line internet protocol
C. Signal line internet protocol
D. Signal internet protocol
Ans: Serial line internet protocol
43. The second port is used to ____________ in the two-port network.
A. Input terminal
B. Output terminal
C. Signal terminal
D. Bandwidth terminal
Ans: Output terminal
44. SONET stands for ______________.
A. Signal Operation Network
B. Synchronous Optical Network
C. System Optical Network
D. Signal Optical Network
Ans: Synchronous Optical Network
45. What is the size of the destination port in the UDP protocol?
A. 8 bits
B. 20 bits
C. 16 bits
D. 32 bits
Ans: 16 bits
46. MAC address is also called ______.
A. Physical address
B. Logical address
C. Source address
D. Destination address
Ans: Physical address
47. Which of the following addresses is 32-bit?
A. MAC address
B. Virtual address
C. Source address
D. Destination address
Ans: Virtual address
48. ARPANET stands for _______.
A. Advanced Recheck Projects Agency Internet
B. Advanced Recheck Projects Agency Network
C. Advanced Research Projects Agency Network
D. Advanced Research Projects Agency Internet
Ans: Advanced Research Projects Agency Network
49. What is the size of the UDP header?
A. 8 bytes
B. 20 bytes
C. 64 bytes
D. 16 bytes
Ans: 8 bytes
50. Which of the following protocols is the connection-less protocol?
A. UDP
B. TCP
C. IP
D. All of the these
Ans: UDP
51. Generally_____________is a multiport repeater
A. repeater
B. hub
C. switch
D. router
Ans:hub
52. A switch enables_____________for devices like hubs and routers
A. Paths
B. routes
C. cables
D. connections
Ans: Connections
53. A LAN segment is the group of devices connected to a hub for the purpose of
sharing____________
A. paths
B. resources
C. devices
D. hubs
Ans: resources
54. a___________can be used to enhance network performance
A. bridge
B. switch
C. hub
D. router
Ans: bridge
55. What is the maximum data transfer rate of the optical fiber wire?
A. 50 kbps
B. 1000 kbps
C. 1000 Mbps
D. None of the these
Ans: 1000 Mbps
56. In the layer hierarchy as the data packet moves from the upper to the lower
layers, headers are ___________
A. Added
B. Removed
C. Rearranged
D. Modified
Ans: Added
57. Application layer is implemented in ____________
A. End system
B. NIC
C. Ethernet
D. Packet transport
Ans: End system
58. Transport layer is implemented in ______________
A. End system
B. NIC
C. Ethernet
D. Signal transmission
Ans: End system
59. The functionalities of the presentation layer include ____________
A.Data compression
B. Data encryption
C. Data description
D. All of the mentioned
Ans: All of the mentioned
60. Delimiting and synchronization of data exchange is provided by __________
A. Application layer
B. Session layer
C. Transport layer
D. Link layer
Ans: Session layer
61. In OSI model, when data is sent from device A to device B, the 5th layer to
receive data at B is _________
A. Application layer
B. Transport layer
C. Link layer
D. Session layer
Ans: Session layer
62. In TCP IP Model, when data is sent from device A to device B, the 4th layer to
receive data at B is ____________
A. Application layer
B. Transport layer
C. Link layer
D. Session layer
Ans: Application layer
63. The physical layer is concerned with ___________
A. bit-by-bit delivery
B. application to application delivery
C. process to process delivery
D. port to port delivery
Ans: bit-by-bit delivery
64. Which transmission media provides the highest transmission speed in a network?
A. optical fiber
B. electrical cable
C. twisted pair cable
D. coaxial cable
Ans: optical fiber
65. Bits can be sent over guided and unguided media as analog signal by ___________
A. digital modulation
B. frequency modulation
C. amplitude modulation
D. phase modulation
Ans: digital modulation
66. In asynchronous serial communication the physical layer provides ___________
A. start and stop signalling
B. flow control
C. both start & stop signalling and flow control
D. only start signalling
Ans: both start & stop signalling and flow control
67. The physical layer is responsible for __________
A. line coding
B. channel coding
C. modulation
D. all of the mentioned
Ans: all of the mentioned
68. The physical layer translates logical communication requests from the ______
into hardware specific operations.
A. data link layer
B. trasnport layer
C. network layer
D. application layer
Ans: data link layer
69. Wireless transmission of signals can be done via ___________
A. radio waves
B. microwaves
C. infrared
D. all of the mentioned
70. The data link layer takes the packets from _________ and encapsulates them
into frames for transmission.
A. network layer
B. physical layer
C. transport layer
D. application layer
Ans:network layer
71. Which of the following tasks is not done by data link layer?
a) framing
b) error control
c) flow control
d) channel coding
Answer: channel coding
72. Which sublayer of the data link layer performs data link functions that depend
upon the type of medium?
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) error control sublayer
Answer: media access control sublayer
73. Header of a frame generally contains ______________
a) synchronization bytes
b) addresses
c) frame identifier
d) all of the mentioned
Answer: all of the mentioned
74. Automatic repeat request error management mechanism is provided by ________
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) application access control sublayer
Answer: logical link control sublayer
75. When 2 or more bits in a data unit has been changed during the transmission,
the error is called ____________
a) random error
b) burst error
c) inverted error
d) double error
Answer: burst error
76. CRC stands for __________
a) cyclic redundancy check
b) code repeat check
c) code redundancy check
d) cyclic repeat check
Answer: cyclic redundancy check
77. Which of the following is a data link protocol?
a) ethernet
b) point to point protocol
c) hdlc
d) all of the mentioned
Answer: all of the mentioned
78. Which of the following is the multiple access protocol for channel access
control?
a) CSMA/CD
b) CSMA/CA
c) Both CSMA/CD & CSMA/CA
d) HDLC
Answer: Both CSMA/CD & CSMA/CA
79. The technique of temporarily delaying outgoing acknowledgements so that they
can be hooked onto the next outgoing data frame is called ____________
a) piggybacking
b) cyclic redundancy check
c) fletcher’s checksum
d) parity check
Answer: piggybacking
80. Physical or logical arrangement of network is __________
a) Topology
b) Routing
c) Networking
d) Control
Answer: Topology
81. Which network topology requires a central controller or hub?
a) Star
b) Mesh
c) Ring
d) Bus
Answer: Star
82. _______ topology requires a multipoint connection.
a) Star
b) Mesh
c) Ring
d) Bus
Answer: Bus
83. Data communication system spanning states, countries, or the whole world is
________
a) LAN
b) WAN
c) MAN
d) PAN
Answer: WAN
84. Data communication system within a building or campus is________
a) LAN
b) WAN
c) MAN
d) PAN
Answer: LAN
85. WAN stands for __________
a) World area network
b) Wide area network
c) Web area network
d) Web access network
Answer: Wide area network
86. In TDM, slots are further divided into __________
a) Seconds
b) Frames
c) Packets
d) Bits
Answer: Frames
87. _____ is the multiplexing technique that shifts each signal to a different
carrier frequency.
a) FDM
b) TDM
c) Both FDM & TDM
d) PDM
Answer: FDM
88. The sharing of a medium and its link by two or more devices is called _________
a) Fully duplexing
b) Multiplexing
c) Micropleixng
d) Duplexing
Answer: Multiplexing
89. Multiplexing is used in _______
a) Packet switching
b) Circuit switching
c) Data switching
d) Packet & Circuit switching
Answer: Circuit switching
90. Which multiplexing technique used to transmit digital signals?
a) FDM
b) TDM
c) WDM
d) FDM & WDM
Answer: TDM
91. Which of this is not a guided media?
a) Fiber optical cable
b) Coaxial cable
c) Wireless LAN
d) Copper wire
Answer: Wireless LAN
92. UTP is commonly used in __________
a) DSL
b) FTTP
c) HTTP
d) None of the mentioned
Answer: DSL
93. Coaxial cable consists of _______ concentric copper conductors.
a) 1
b) 2
c) 3
d) 4
Answer: 2
94. Fiber optics posses following properties __________
a) Immune electromagnetic interference
b) Very less signal attenuation
c) Very hard to tap
d) All of the mentioned
Answer: All of the mentioned
95. If an Optical Carrier is represented as OC-n, generally the link speed
equals(in Mbps) __________
a) n*39.8
b) n*51.8
c) 2n*51.8
d) None of the mentioned
Answer: n*51.8
96. Terrestrial radio channels are broadly classifed into _____ groups.
a) 2
b) 3
c) 4
d) 1
Answer: 3
97. Radio channels are attractive medium because ______________
a) Can penetrate walls
b) Connectivity can be given to mobile user
c) Can carry signals for long distance
d) All of the mentioned
Answer: All of the mentioned
98. Geostationary satellites ___________
a) Are placed at a fixed point above the earth
b) Rotate the earth about a fixed axis
c) Rotate the earth about a varying axis
d) All of the mentioned
Answer: Are placed at a fixed point above the earth
99. Packet sniffers involve ____________
a) Active receiver
b) Passive receiver
c) Legal receiver
d) Partially-active receiver
Answer: Passive receiver
100. Firewalls are often configured to block ___________
a) UDP traffic
b) TCP traffic
c) Sensitive traffic
d) Best-effort traffic
Answer: UDP traffic