You are on page 1of 23

DEPARTMENT OF COMPTER SCIENCE

St. Josephs College (Autonomous)


Tiruchirappalli 620 002
Course MCA
Sem IV Paper Code 14PCA4124 Units IV
Title of the
COMPUTER NETWORKS AND SECURITY
Paper
Staff Name Dr. S. Albert Rabara

UNIT - I
1. The physical layer concerns with
a) bit-by-bit delivery b) process to process delivery
c) application to application delivery d) none of the mentioned
Answer:a

2. Which transmission media has the highest transmission speed in a network?


a) coaxial cable b) twisted pair cable
c) optical fiber d) electrical cable
Answer:c
3. The portion of physical layer that interfaces with the media access control sub-layer
is called
a) physical signaling sub layer b) physical data sub layer
c) physical address sub layer d) none of the mentioned
Answer:a
4. physical layer provides
a) a) mechanical specifications of b) electrical specification of transmission
electrical connectors and cables line signal level
c) specification for IR over optical d) all of the mentioned
fiber
Answer:d
5. The OSI model has ___ layers.
a) 9 b) 5
c) 6 d) 7
Answer :d
6. In asynchronous serial communication the physical layer provides
a) start and stop signalling b) flow control
c) both (a) and (b) d) None of these
Answer:c
7. The physical layer is responsible for
a) line coding b) channel coding
c) modulation d) all of the mentioned
Answer:d
8. The physical layer translates logical communication requests from the ______ into
hardware specific operations.

a) data link layer b) network layer


c) transport layer d) application layer
Answer:a

9. A single channel is shared by multiple signals by


a) analog modulation b) digital modulation
c) multiplexing d) none of the mentioned
Answer:c
10. Wireless transmission can be done via
a) radio waves b) microwaves
c) infrared d) all of the mentioned
Answer:d

11. OSI stands for


a) open system interconnection b) operating system interface
c) optical service implementation d) none of the mentioned
Answer:a
12. The_________ layer is responsible for the delivery of a message from one process to
another.
a) Physical b) transport
c) network d) none of the above
Answer: b)
13. Which performs modulation and demodulation
a) Modem b) Fiber optic
c) satellite d) coaxial cable
Answer: a)
14. Dialogue control and token management are responsibilities of
a) Network layer b) Session Layer
c) Transport Layer d) None of above
Answer: b)

15. First network which was made available

a) IBMm Token Ring 1985 b) Novell Netware


c) IBM PC Network 1984 d) DECNet 1980
Answer: d)

16. Most commonly used transmission speeds in BPS is


a) 2400 b) 9600
c) 1200 d) 4800
Answer: a)
17. A central computer surrounded by one or more computers is called
a) ring network b) bus network
c) star network d) all of above
Answer: c)
18. ........... is the physical path between the transmitter and receiver.
a) Transmission media b) Physical media
c) Transmission path d) Receiving path
Answer: d)
19. A network which need human intervention for routing signal is
a) Bus network b) ring network
c) star network d) T switched network
Answer: d)
20. Name of the topology in which there are bidirectional links between each possible
nodes
a) Ring b) Mesh
c) Star d) Tree
Answer: b)
21. Communication mode which supports data in both directions at the same time is
called
a) simplex b) Full duplex
c) Half duplex d) multiplex
Answer: b)
22. During networking, the process of processor asking each host that if it want to send
message is called

a) querying b) sharing
c) communicating d) polling
Answer: d)
23. A communication network which is used over regional, national or global area is
a) LAN b) WAN
c) MAN d) VAN
Answer: b)
24. What is max data capacity for optical fiber cable?
a) 10 mbps b) 100 mbps
c) 1000 mbps d) 10000 mbps

Answer: c)

25. ........... is used to optimize the use of the channel capacity available in a network, to
minimize the transmission latency and to increase robustness of communication.
a) Message switching b) Linear switching
c) circuit switching d) packet switching
Answer: a)
26. In OSI network architecture, the dialogue control and token management are
responsibility of
a) session layer b) network layer
c) data link layer d) none of above

Answer: a)
27.
In OSI network architecture, the routing is performed by

a) network layer b) data link layer


c) transport layer d)
session layer

Answer: a)
28. A communication path way that transfers data from one pint to another is called
a) Link b) Node
c) Medium d) Topology
Answer: a)
29. The multipoint topology is
a) Bus b) Star
c) Mesh d) Ring
Answer: a)
30. The combination of two or more networks are called
a) Internetwork b) WAN
c) MAN d) LAN
Answer: a)
UNIT II
31. The data link layer takes the packets from _____ and encapsulates them into frames
for transmission.
a) network layer b) physical layer
c) transport layer d) application layer
Answer:a
32. Which one of the following task is not done by data link layer?
a) framing b) error control
c) flow control d) channel coding
Answer:d
33. Which sub-layer of the data link layer performs data link functions that depend upon
the type of medium?
a) logical link control sublayer b) media access control sublayer
c) network interface control sublayer d) none of the mentioned
Answer:b
34. Header of a frame generally contains
a) synchronization bytes b) addresses
c) frame identifier d) all of the mentioned
Answer:d
35. Automatic repeat request error management mechanism is provided by
a) logical link control sublayer b) media access control sublayer

c) network interface control sublayer d) none of the mentioned


Answer:a
36. When 2 or more bits in a data unit has been changed during the transmission, the
error is called
a) Random error b) burst error

c) inverted error d) none of the mentioned


Answer:b
37. Which one of the following is a data link protocol?
a) ethernet b) point to point protocol
c) HDLC d) all of the mentioned
Answer:d
38. Which one of the following is the multiple access protocol for channel access
control?
a) CSMA/CD b) CSMA/CA

c) both (a) and (b) d) none of the mentioned


Answer:c
39. The technique of temporarily delaying outgoing outgoing acknowledgements so that
they can be hooked onto the next outgoing data frame is called
a) piggybacking b) cyclic redundancy check
c) fletchers checksum d) none of the mentioned
Answer:a
40. ............ in the data link layer separates a message from one source to a destination, or
from other messages to other destinations, by adding a sender address and a
destination address.
a) Transforming b) Framing
c) Separating d) Messaging

Answer: B. Framing
41. In .......... we are looking only to see if any error has occurred.
a) error searching b) error detection
c) error correction d) error transmission
B. error detection
42. In ........... we need to know the exact number of bits that are corrected and more
importantly, their location in the message.
a) error searching b) error detection
c) error correction d) error transmission

C. error correction
43. ............ is the process in which the receiver tries to guess the message by using
redundant bits.
a) Forward error correction b) Backward error correction
c) Transmission d) Retransmission
A. Forward error correction
44. ........... is the technique in which the receiver detects the occurrence of an error and
asks the sender to resend the message.
a) Forward error correction b) Backward error correction
c) Transmission d) Retransmission

C. Retransmission
45. In a real-life network, the data link protocols are implemented as
a) directional b) unidirectional

c) bidirectional d) omnidirectional

Answer: c)
46. The functions of the data link control includes
a) framing b) flow and error control
c) software implemented protocols d) All of the above
Answer: d)
47. The data link layer in the IEEE standard is divided into two sub layers of
a) MAC and ACKs b) LAN and MAC
c) LLC and ANSI d) LLC and MAC
Answer: d)
48. The two main functions of the data link layer are
a) hardware link control and media b) data link control and protocol access
access control control
c) data link control and media access d) both a and c
control
Answer: c)
49. In Frequency Division Multiple Access, the data link layer in each station tells its
a) Multiple Layer b) Physical Layer
c) Dual Layer d) Filtered Layer
Answer: b)
50. The applications of Frequency-Division Multiplexing (FDM) are
a) Television broadcasting. b) AM and FM radio stations
c) cellular telephones d) All of the above
Answer: d)
51. The difference between the Wavelength-Division Multiplexing (WDM) and
Frequency-Division Multiplexing ( FDM ) is that the frequencies are
a) very high b) very low
c) zero d) infinity
Answer: a)
52. FDM is an analog multiplexing technique that combines
a) digital signals b) analog signals
c) both a and b d) None
Answer: b)
53. Which is based on orthogonality?
a) TDM b) FDM
c) Both of the mentioned d) None of the mentioned
Answer: b
54. Which provides constant delay?
a) Synchronous TDM b) Non synchronous TDM
c) Both of the mentioned d) None of the mentioned
Answer: a
55. Example for reservation system is
a) Synchronous TDM b) Non synchronous TDM
c) Both of the mentioned d) None of the mentioned
Answer: a
56. Which are non orthogonal multiplexing?
a) TDM b) FDM
c) Both of the mentioned d) None of the mentioned
Answer: d
57. Which is used by many users to establish their home PC to the Internet via a phone-
line connection
a) FTP b) PPP

c) OSI d) PAR

Answer: b)
58. Sliding window protocol is also used by most of the _______________________
a) Connection oriented protocols b) Connection oriented network
protocols

c) Connection network protocols d) None of these

Answer: b)
59. Sliding window protocol works on _________ in which there is simultaneous two-
way communication
a) no duplex b) half duplex

c) full duplex d) single duplex

Answer: c)
60. Sliding window protocol makes use of two types of frames namely
a) Data frame b) Acknowledgement frame

c) Both a & b d) None of these

Answer: c)
UNIT III
61. The network layer concerns with
a) Bits b) frames
c) Packets d) none of the mentioned
Answer:c
62. Which one of the following is not a function of network layer?
a) Routing b) inter-networking
c) congestion control d) none of the above
Answer:d
63. The 4 byte IP address consists of
a) network address b) host address
c) both (a) and (b) d) none of the mentioned
Answer:c

64. Which one of the following routing algorithm can be used for network layer design?
a) shortest path algorithm b) distance vector routing
c) link state routing d) all of the these
Answer:d
65. Which one of the following algorithm is not used for congestion control?
a) traffic aware routing b) admission control
c) load shedding d) none
Answer:d
66. A network that needs human beings to manually route signals is called....
a) Fiber Optic Network b) Bus Network
c) T-switched network d) Ring network
Answer: c)
67. TCP/IP ................. layer corresponds to the OSI models to three layers.
a) Application b) Presentation
c) Session d) Transport
Answer: a)
68. Which of the transport layer protocols is connectionless?
a) UDP b) TCP
c) FTP d) Nvt
Answer: a)
69. Which of the following applications allows a user to access and change remote files
without actual transfer?
a) DNS b) FTP
c) NFS d) Telnet
Answer: c)
70. The data unit in the TCP/IP layer called a .....
a) Message b) Segment
c) Datagram d) Frame
Answer: d)
71. DNS can obtain the ................. of host if its domain name is known and vice versa.
a) Station address b) IP address
c) Port address d) Checksum
Answer: b)
72. The network layer concerns with
a) Bits b) frames
c) Packets d) none of the mentioned
Answer: c)
73. Which one of the following is not a function of network layer?
a) Routing b) inter-networking
c) congestion control d) none of the mentioned
Answer:d
74. The 4 byte IP address is not consists of
a) network address b) host address
c) both (a) and (b) d) none of the mentioned
Answer: d)
75. In the version field of header IPv4, when the machine is using some other version of
IPv4 then the datagram is
a) discarded b) terminated
c) switched d) linked
Answer: a)
76. The network layer at the source is responsible for creating a packet from the data
coming from another
a) Data b) Link
c) IP d) Protocol
Answer: d)
77. The header of the datagram in the IPv4 has
a) 0 to 20 bytes b) 20 to 40 bytes
c) 20 to 60 bytes d) 20 to 80 bytes
Answer: c)
78. In the IPv4 layer, the datagram is a
a) fixed length b) variable length
c) long length d) short length
Answer: b)
79. In IPv4, the service type of the service in the header field, the first 3 bits are called
a) type of service b) code bits
c) differentiated bits d) precedence bits
Answer: d)
80. In IPv4, to record the Internet routers that handle the datagram, a option is used
which is
a) Record IP b) Record Data
c) Record Router d) Record Header
Answer: c)
81. The Internet has chosen the datagram approach to switching in the
a) Data Link Layer b) network Layer
c) Switched Layer d) Linear Layer

Answer: b)
82. In IPv4, the thing encapsulated in a frame is
a) Instagram b) Data Frame
c) Datagram d) Minigram
Answer: c)
83. In Internetwork, network layer is responsible for
a) Host to Host Link b) Host to Host Delivery
c) Host to Host IP d) Host to Host Information
Answer: b)
84. CCT stands for
a) Close Circuit Transmission b) Congestion Controlled Traffic
c) Congestion Controlled d) Close Circuit Traffic
Transmission
Answer: b)
85. The total length of the IPv4 datagram is limited to 65,535 (216 - 1) bytes, since the
field length is
a) 10 Bits b) 12 Bits
c) 14 Bits d) 16 Bits
Answer: d)
86. When the option of the IPv4 is at its maximum size, the value of this field is
a) 5 b) 15
c) 20 d) 60
Answer: b)
87. The effective bandwidth is the bandwidth that the network needs to allocate for the
a) Flow of Data b) Flow of Protocol
c) Flow of Traffic d) Flow of Amount
Answer: c)
88. In Congestion Control, DVL stands for
a) Delay Versus Lose b) Delay Versus Line
c) Delay Versus Load d) Delay Versus Louden
Answer: c)
89. In Congestion, CBR stands for
a) Control Bit Rate b) Constant Bit Rate
c) Constant Byte Rate d) Control Byte Rate
Answer: b)
90. Four different attributes to control traffic have been devised in
a) Data Relay b) Source Relay
c) Frame Relay d) IP Relay
Answer: c)
UNIT IV

91. TCP is a .......... protocol.


a) stream-oriented b) message-oriented
c) block-oriented d) packet-oriented
Answer: a)
92. Which of the following is not the layer of TCP/IP protocol?
a) Physical layer b) link layer
c) network layer d) Transport layer.
Answer: a)
93. TCP groups a number of bytes together into a packet called a ....
a) user datagram b) segment
c) Datagram d) packet
Answer: b)
94. The .......... of TCP/IP protocol is responsible for figuring out how to get data to its
destination.
a) Application layer b) link layer
c) network layer d) Transport layer.
Answer: c)
95. TCP is a (n)........... Transport protocol.
a) protocol delivery b) reliable
c) best-effort delivery d) effortless delivery
Answer: b)
96. ......... is the protocol that hides the underlying physical network by creating a virtual
network view.
a) Internet Protocol(IP) b) Internet Control Message
Protocol(ICMP)
c) Address Resolution Protocol(ARP) d) Bootstrap Protocol(BOOTP)
Answer: a)
97. To use the services of UDP, we need ......... socket addresses.
a) One b) Two
c) Three d) Four
Answer: b)
98. Which of the following is not the name of Regional Internet Registries(RIR) to
administer the network number portion of IP address.
a) American Registry for Internet b) Reseaux IP Europeans(RIPE)
Numbers(ARIN)
c) Europeans Registry for Internet d) Asia Pacific Network Information
Numbers(ERIN) Center(APNIC)
Answer: c
99. UDP packets are called .......
a) user datagrams b) segments
c) Frames d) packets
Answer: a
100. ............ addresses use 21 bits for the and 8 bits for the portion of the IP address for
TCP/IP network.
a) Class A b) Class B
c) Class C d) Class D
Answer: c)
101. TCP is a .......... protocol.
a) stream-oriented b) message-oriented
c) block-oriented d) packet-oriented
Answer: a)
102. Which of the following is not the layer of TCP/IP protocol?
a) Physical layer b) link layer
c) network layer d) Transport layer.
Answer: a)
103. A port address in TCP/IP is .........bits long.
a) 32 b) 48
c) 16 d) 64
Answer: c)
104. TCP groups a number of bytes together into a packet called a ....
a) user datagram b) segment
c) datagram d) packet
Answer: b)
105. The .......... of TCP/IP protocol is responsible for figuring out how to get data to its
destination.
a) application layer b) link layer
c) network layer d) transport layer.
Answer: c)
106. Telnet
a) allows user to connect client b) transferring files
machine
c) sharing files d) none of above
Answer: a)
107. Which protocol deals with emails
a) FTP b) SMTP
c) LPD d) X window
Answer: b)
108. Which protocol deals with resolving domain names
a) X-Window b) SMTP
c) DNS d) FTP
Answer: c)
109. Which protocol ensures reliable delivery
a) TCP b) UDP
c) Both of above d) None of above
Answer: a)
110. Which of the protocol uses window flow system
a) UDP b) TCP
c) FTP d) None of above
Answer: b)
111. Routing is done on which layer
a) Datalink Layer b) Network Layer
c) Session d) Presentation
Answer: b)
112. Which of the transport layer protocols is connectionless?
a) UDP b) TCP
c) FTP d) Nvt
Answer: a)
113. Which of the following applications allows a user to access and change remote files
without actual transfer?
a) DNS b) FTP
c) NFS d) Telnet
Answer: c)
114. The data unit in the TCP/IP data link layer called a .....
a) Message b) segment
c) Datagram d) frame
Answer: d)
115. Which of the following OSI layers correspond to TCP/IP's application layer?
a) application b) presentation
c) session d) All the above
Answer: d)
116. Devices on one network can communicate with devices on another network via a
.......
a) File Server b) Utility Server
c) Printer Server d) Gateway
Answer: d)
117. A communication device that combines transmissions from several I/O devices into
one line is a
a) Concentrator b) Modifier
c) Multiplexer d) Full duplex file
Answer: c)
118. Which language in WWW specifies a web's way by describing three-dimensional
objects?
a) HTML b) VRML
c) XML d) UML
Answer: b)
119. Which among the following are uncontrolled and un-registered forms of ephemeral
ports in accordance to IANA?
a) Well known Ports b) Registered Ports
c) Dynamic Ports d) All of the above
Answer: c)
120. Which among the following are delivered by the transport layer in process-to-process
delivery mechanism?
a) Frame b) Datagrams
c) Packets d) All of the above
Answer: c
UNIT V

121. File virus attaches itself to the


a) source file b) object file
c) executable file d) all of the above
Answer: c)
122. What is a trap door in a program?
a) a security hole, inserted at b) a type of antivirus
programming time in the system
for later use
c) security hole in a network d) none of the mentioned
Answer: a)
123. Which one of the following is not an attack, but a search for vulnerabilities to attack?
a) denial of service b) port scanning
c) memory access violation d) dumpster diving
Answer: b)
124. A sender must not be able to deny sending a message that he or she, in fact, did send,
is known as
a) Message Nonrepudiation b) Message Integrity
c) Message Confidentiality d) Message Sending
Answer: a)
125. Message confidentiality is using
a) Cipher Text b) Cipher
c) Symmetric-Key d) Asymmetric-Key
Answer: d)
126. Encryption and decryption provide secrecy, or confidentiality, but not
a) Authentication b) Integrity
c) Keys d) Frames
Answer: b)
127. In Message Confidentiality, the transmitted message must make sense to only the
intended
a) Receiver b) Sender
c) Third Party d) Translator
Answer: a)
128. Message authentication is a service beyond
a) Message Confidentiality b) Message Integrity
c) A. Message Splashing d) Message Sending

Answer: b)
129. One of the protocols to provide security at the application layer is
a) Pretty Good Privacy b) Handshake Protocol
c) Alert Protocol d) Record Protocol
Answer: a)
130. The SSL divides the data into blocks of
a) 2*6 b) 2*14
c) 2*20 d) 2*24
Answer: b)
131. A packet filter firewall filters at the
a) application or transport b) data link layer
c) physical d) network or transport layer
Answer: d)
132. A proxy firewall filters at the
a) physical layer b) application layer
c) data link layer d) network layer
Answer: b)
133. The man-in-the-middle attack can endanger the security of the Diffie-Hellman
method if two parties are not
a) Authenticated b) Joined
c) Submit d) Separate
Answer: a)
134. What are major components of intrusion detection system ?
a) Analysic Engine b) Event provider
c) Zone system d) Alert Database

Answer: a,b & d


135. Firewalls are often configured to block
a) UDP traffic b) TCP traffic
c) Both a and b d) none of these
Answer: a)
136. Packet sniffers involve
a) Active receiver b) Passive receiver
c) Both of the mentioned d) None of the mentioned
Answer: b)
137. The DoS attack is which the attacker sends deluge of packets to the targeted host
a) Vulnerability attack b) Bandwidth flooding
c) Connection flooding d) All of the mentioned
Answer: b)
138. The DoS attack is which the attacker establishes a large number of half-open or fully
open TCP connections at the target host
a) Vulnerability attack b) Bandwidth flooding
c) Connection flooding d) All of the mentioned
Answer: c)
139. Which of the following is a form of DoS attack?
a) Vulnerability attack b) Bandwidth flooding
c) Connection flooding d) All of the mentioned
Answer: d)
140. In asymmetric key cryptography, the private key is kept by
a) sender b) receiver
c) sender and receiver d) all the connected devices to the
network
Answer: b)
141. When a DNS server accepts and uses incorrect information from a host that has no
authority giving that information, then it is called
a) DNS lookup b) DNS hijacking
c) DNS spoofing d) All the above
Answer: c)
142. PGP encrypts data by using a block cipher called
a) international data encryption b) private data encryption algorithm
algorithm
c) intranet data encryption algorithm d) None of the these
Answer: a)
143. Pretty good privacy (PGP) is used in
a) browser security b) email security
c) FTP security d) none of the mentioned
Answer: b)
144. Extensible authentication protocol is authentication framework frequently used in
a) wired personal area network b) wireless networks
c) wired local area network d) none of the mentioned
Answer: b)
145. An attempt to make a computer resource unavailable to its intended users is called
a) denial-of-service attack b) virus attack
c) worms attack d) botnet process
Answer: a)
146. WPA2 is used for security in
a) ethernet b) Bluetooth
c) wi-fi d) none of the mentioned
Answer: c)
147. Network layer firewall has two sub-categories as
a) Stateful firewall and stateless b) bit oriented firewall and byte oriented
firewall firewall
c) frame firewall and packet firewall d) none of the mentioned
Answer: a)
148. Network layer firewall works as a
a) frame filter b) packet filter
c) both (a) and (b) d) none of the mentioned
Answer: b)
149. In tunnel mode IPsec protects the
a) entire IP packet b) IP header
c) IP payload d) none of the mentioned
Answer: a)
150. IPSec is designed to provide the security at the
a) transport layer b) network layer
c) application layer d) session layer
Answer: b)

********************

You might also like