Multiple-Choice Questions on Computer Networks and Security of TU IT Adhikirit

 

Multiple-Choice Questions on Computer Networks and Security

Computer Networks, Types of Networks, and Applications

  1. Which of the following is NOT a type of computer network?
    a) LAN
    b) WAN
    c) SAN
    d) MAN
    Answer: c) SAN
    Explanation: SAN (Storage Area Network) is a specialized network for data storage, not a general-purpose computer network like LAN, WAN, or MAN.

  2. What is a primary application of a Personal Area Network (PAN)?
    a) Connecting devices in a single office
    b) Facilitating short-range wireless communication between personal devices
    c) Supporting enterprise-wide data storage
    d) Connecting multiple cities
    Answer: b) Facilitating short-range wireless communication between personal devices
    Explanation: PANs, such as Bluetooth networks, are used for short-range communication between devices like smartphones and headsets.

Layered Network Architecture, OSI and TCP/IP Model

  1. How many layers are there in the OSI model?
    a) 5
    b) 6
    c) 7
    d) 8
    Answer: c) 7
    Explanation: The OSI model consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  2. Which layer in the TCP/IP model corresponds to the OSI model’s Session, Presentation, and Application layers?
    a) Network Layer
    b) Transport Layer
    c) Application Layer
    d) Internet Layer
    Answer: c) Application Layer
    Explanation: The TCP/IP model’s Application Layer encompasses the functionalities of the OSI model’s Session, Presentation, and Application layers.

Physical Layer, Transmission Media, Switching, and Multiplexing

  1. Which transmission medium offers the highest bandwidth?
    a) Twisted Pair
    b) Coaxial Cable
    c) Optical Fiber
    d) Radio Waves
    Answer: c) Optical Fiber
    Explanation: Optical fiber provides the highest bandwidth and supports high-speed data transmission over long distances.

  2. What is the purpose of multiplexing in computer networks?
    a) To increase packet loss
    b) To combine multiple signals into a single transmission medium
    c) To encrypt data
    d) To filter network traffic
    Answer: b) To combine multiple signals into a single transmission medium
    Explanation: Multiplexing allows multiple signals to share a single medium, improving efficiency.

Data Link Layer, MAC Address, Multiple Access Protocols

  1. What does CSMA/CD stand for in the context of multiple access protocols?
    a) Carrier Sense Multiple Access with Collision Detection
    b) Carrier Sense Multiple Access with Collision Avoidance
    c) Controlled Sense Multiple Access with Collision Detection
    d) Carrier Sense Multi-Protocol Access with Collision Detection
    Answer: a) Carrier Sense Multiple Access with Collision Detection
    Explanation: CSMA/CD is used in Ethernet networks to detect and manage collisions in shared media.

  2. What is the size of a MAC address?
    a) 32 bits
    b) 48 bits
    c) 64 bits
    d) 128 bits
    Answer: b) 48 bits
    Explanation: A MAC address is a 48-bit (6-byte) unique identifier assigned to network interfaces.

Network Devices: Repeaters, Hubs, Bridges, Switches, Routers, Gateways

  1. Which device operates at the Network Layer (Layer 3) of the OSI model?
    a) Hub
    b) Switch
    c) Router
    d) Repeater
    Answer: c) Router
    Explanation: Routers operate at the Network Layer, making routing decisions based on IP addresses.

  2. What is the primary function of a bridge in a network?
    a) Connects different network protocols
    b) Filters and forwards frames based on MAC addresses
    c) Amplifies signals
    d) Routes packets between networks
    Answer: b) Filters and forwards frames based on MAC addresses
    Explanation: Bridges operate at the Data Link Layer, connecting LAN segments and filtering traffic using MAC addresses.

Network Layer, IP Addressing, Routing Protocols

  1. Which of the following is a private IP address range?
    a) 172.16.0.0 – 172.31.255.255
    b) 192.0.0.0 – 192.255.255.255
    c) 10.0.0.0 – 10.255.255.255
    d) Both a and c
    Answer: d) Both a and c
    Explanation: Private IP address ranges include 10.0.0.0–10.255.255.255, 172.16.0.0–172.31.255.255, and 192.168.0.0–192.168.255.255.

  2. Which routing protocol is classified as a link-state protocol?
    a) RIP
    b) OSPF
    c) EIGRP
    d) BGP
    Answer: b) OSPF
    Explanation: OSPF (Open Shortest Path First) is a link-state routing protocol that uses Dijkstra’s algorithm for path computation.

IP Address Management, Autonomous System, Multi-homing

  1. What is an Autonomous System (AS) in networking?
    a) A collection of IP routing prefixes under a single administration
    b) A group of computers in a LAN
    c) A type of encryption protocol
    d) A physical network device
    Answer: a) A collection of IP routing prefixes under a single administration
    Explanation: An AS is a group of IP networks managed by a single entity, identified by an AS number.

  2. What does multi-homing refer to in IP address management?
    a) Using a single ISP for connectivity
    b) Connecting a network to multiple ISPs for redundancy
    c) Assigning multiple IP addresses to a single device
    d) Using private IP addresses only
    Answer: b) Connecting a network to multiple ISPs for redundancy
    Explanation: Multi-homing enhances network reliability by connecting to multiple ISPs.

Transport Layer, TCP, and UDP Protocols

  1. Which protocol provides reliable, connection-oriented data transfer?
    a) UDP
    b) TCP
    c) IP
    d) ICMP
    Answer: b) TCP
    Explanation: TCP ensures reliable data transfer with error checking and retransmission, unlike UDP, which is connectionless.

  2. What is the range of well-known port numbers used by the Transport Layer?
    a) 0–1023
    b) 1024–49151
    c) 49152–65535
    d) 65536–99999
    Answer: a) 0–1023
    Explanation: Well-known ports (0–1023) are reserved for standard protocols like HTTP (80) and FTP (21).

Application Layer Protocols

  1. Which protocol is used for secure web browsing?
    a) HTTP
    b) HTTPS
    c) FTP
    d) SMTP
    Answer: b) HTTPS
    Explanation: HTTPS uses SSL/TLS to provide secure communication over the web.

  2. Which protocol is responsible for resolving domain names to IP addresses?
    a) SMTP
    b) DNS
    c) POP
    d) IMAP
    Answer: b) DNS
    Explanation: DNS (Domain Name System) translates domain names (e.g., www.example.com) to IP addresses.

Distributed Systems, Clusters, Network Security, Data Storage

  1. What is a key characteristic of a distributed system?
    a) Centralized control and single point of failure
    b) Multiple interconnected computers working together
    c) Limited to a single geographic location
    d) No need for network connectivity
    Answer: b) Multiple interconnected computers working together
    Explanation: Distributed systems involve multiple nodes collaborating to achieve a common goal, often improving scalability and fault tolerance.

  2. What is the primary difference between NAS and SAN?
    a) NAS uses block-level storage, while SAN uses file-level storage
    b) NAS provides file-level storage, while SAN provides block-level storage
    c) NAS is used only for backups, while SAN is used for real-time access
    d) NAS is more expensive than SAN
    Answer: b) NAS provides file-level storage, while SAN provides block-level storage
    Explanation: NAS (Network Attached Storage) operates at the file level, while SAN (Storage Area Network) operates at the block level, often used for high-performance applications.

Network Security, Passive and Active Attacks, Cryptography

  1. Which of the following is an example of a passive attack?
    a) Man-in-the-Middle attack
    b) Denial-of-Service attack
    c) Eavesdropping
    d) Packet injection
    Answer: c) Eavesdropping
    Explanation: Passive attacks, like eavesdropping, involve monitoring or intercepting data without altering it, unlike active attacks.

  2. Which cryptographic technique uses a single key for both encryption and decryption?
    a) Asymmetric encryption
    b) Symmetric encryption
    c) Hashing
    d) Digital signatures
    Answer: b) Symmetric encryption
    Explanation: Symmetric encryption, such as DES and AES, uses the same key for both encryption and decryption.

Symmetric and Asymmetric Encryption

  1. Which of the following is a symmetric encryption algorithm?
    a) RSA
    b) AES
    c) Diffie-Hellman
    d) ECC
    Answer: b) AES
    Explanation: AES (Advanced Encryption Standard) is a symmetric encryption algorithm, while RSA and Diffie-Hellman are asymmetric.

  2. What is a key advantage of asymmetric encryption over symmetric encryption?
    a) Faster processing speed
    b) Uses a single key for simplicity
    c) Enables secure key exchange over an insecure channel
    d) Requires less computational power
    Answer: c) Enables secure key exchange over an insecure channel
    Explanation: Asymmetric encryption, using public and private keys, allows secure key exchange (e.g., Diffie-Hellman).

Cryptographic Hash Functions, Message Authentication Code, Digital Signature

  1. What is the primary purpose of a cryptographic hash function?
    a) To encrypt data for secure transmission
    b) To generate a fixed-length output from variable-length input
    c) To establish a secure connection
    d) To authenticate users
    Answer: b) To generate a fixed-length output from variable-length input
    Explanation: Hash functions produce a fixed-length hash value, used for data integrity and authentication.

  2. What does a digital signature provide in network security?
    a) Confidentiality
    b) Integrity and authentication
    c) Availability
    d) Encryption
    Answer: b) Integrity and authentication
    Explanation: Digital signatures verify the authenticity and integrity of a message using asymmetric cryptography.

Securing Wireless LANs, VPN, Firewalls, IDS, and IPS

  1. What is the primary function of an Intrusion Prevention System (IPS)?
    a) To detect and log intrusions
    b) To actively block malicious traffic
    c) To encrypt wireless communications
    d) To provide remote access
    Answer: b) To actively block malicious traffic
    Explanation: An IPS actively monitors and blocks malicious activities, unlike an IDS, which only detects and logs them.

  2. Which protocol is commonly used to secure Wireless LANs?
    a) WEP
    b) WPA3
    c) FTP
    d) SMTP
    Answer: b) WPA3
    Explanation: WPA3 is the latest standard for securing Wi-Fi networks, offering stronger encryption than WEP or WPA2.

Disaster Recovery, Data Backup, Fault Tolerance

  1. What is a key component of a disaster recovery plan?
    a) Regular software updates
    b) Data backup and restoration procedures
    c) Network performance optimization
    d) User authentication protocols
    Answer: b) Data backup and restoration procedures
    Explanation: A disaster recovery plan includes strategies for data backup and restoration to ensure business continuity.

  2. What does fault tolerance in a network refer to?
    a) Preventing all network failures
    b) Ensuring continued operation despite hardware or software failures
    c) Increasing network bandwidth
    d) Encrypting all network traffic
    Answer: b) Ensuring continued operation despite hardware or software failures
    Explanation: Fault tolerance involves designing systems to remain operational during failures, often through redundancy.

Advanced Data Storage Techniques

  1. Which storage technology is best suited for high-speed, low-latency access in enterprise environments?
    a) NAS
    b) SAN
    c) Local hard drives
    d) Tape storage
    Answer: b) SAN
    Explanation: SANs provide high-speed, block-level storage, ideal for enterprise applications requiring low latency.

  2. What is a benefit of clustering in data storage?
    a) Reduces storage capacity
    b) Improves scalability and reliability
    c) Eliminates the need for backups
    d) Decreases data access speed
    Answer: b) Improves scalability and reliability
    Explanation: Clustering enhances storage systems by distributing data across multiple nodes, improving performance and fault tolerance.

Network Troubleshooting and Support Tools

  1. Which tool is commonly used to test network connectivity?
    a) Ping
    b) FTP
    c) HTTP
    d) SMTP
    Answer: a) Ping
    Explanation: Ping uses ICMP to test connectivity and measure round-trip time between devices.

  2. What is the purpose of establishing a network baseline?
    a) To encrypt network traffic
    b) To measure normal network performance for troubleshooting
    c) To configure firewalls
    d) To assign IP addresses
    Answer: b) To measure normal network performance for troubleshooting
    Explanation: A network baseline provides a reference for normal performance, aiding in identifying anomalies during troubleshooting.

Network Access Points, Common Components, and Peripheral Ports

  1. What is the function of a Network Access Point (NAP)?
    a) To connect end-user devices to a LAN
    b) To serve as an interconnection point between ISPs
    c) To encrypt network traffic
    d) To store network data
    Answer: b) To serve as an interconnection point between ISPs
    Explanation: NAPs facilitate data exchange between different Internet Service Providers.

  2. Which port is commonly used for USB connections in networking peripherals?
    a) RJ45
    b) USB-A
    c) HDMI
    d) VGA
    Answer: b) USB-A
    Explanation: USB-A is a standard peripheral port used for connecting devices like network adapters or external drives.

Comments

Popular posts from this blog

Suppose that a data warehouse for Big-University consists of the following four dimensions: student, course, semester, and instructor, and two measures count and avg_grade. When at the lowest conceptual level (e.g., for a given student, course, semester, and instructor combination), the avg_grade measure stores the actual course grade of the student. At higher conceptual levels, avg_grade stores the average grade for the given combination. a) Draw a snowflake schema diagram for the data warehouse. b) Starting with the base cuboid [student, course, semester, instructor], what specific OLAP operations (e.g., roll-up from semester to year) should one perform in order to list the average grade of CS courses for each BigUniversity student. c) If each dimension has five levels (including all), such as “student < major < status < university < all”, how many cuboids will this cube contain (including the base and apex cuboids)?

Pure Versus Partial EC

Suppose that a data warehouse consists of the three dimensions time, doctor, and patient, and the two measures count and charge, where a charge is the fee that a doctor charges a patient for a visit. a) Draw a schema diagram for the above data warehouse using one of the schemas. [star, snowflake, fact constellation] b) Starting with the base cuboid [day, doctor, patient], what specific OLAP operations should be performed in order to list the total fee collected by each doctor in 2004? c) To obtain the same list, write an SQL query assuming the data are stored in a relational database with the schema fee (day, month, year, doctor, hospital, patient, count, charge)