Multiple-Choice Questions on Computer Networks and Security of TU IT Adhikirit
Multiple-Choice Questions on Computer Networks and Security
Computer Networks, Types of Networks, and Applications
Which of the following is NOT a type of computer network?
a) LAN
b) WAN
c) SAN
d) MAN
Answer: c) SAN
Explanation: SAN (Storage Area Network) is a specialized network for data storage, not a general-purpose computer network like LAN, WAN, or MAN.What is a primary application of a Personal Area Network (PAN)?
a) Connecting devices in a single office
b) Facilitating short-range wireless communication between personal devices
c) Supporting enterprise-wide data storage
d) Connecting multiple cities
Answer: b) Facilitating short-range wireless communication between personal devices
Explanation: PANs, such as Bluetooth networks, are used for short-range communication between devices like smartphones and headsets.
Layered Network Architecture, OSI and TCP/IP Model
How many layers are there in the OSI model?
a) 5
b) 6
c) 7
d) 8
Answer: c) 7
Explanation: The OSI model consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.Which layer in the TCP/IP model corresponds to the OSI model’s Session, Presentation, and Application layers?
a) Network Layer
b) Transport Layer
c) Application Layer
d) Internet Layer
Answer: c) Application Layer
Explanation: The TCP/IP model’s Application Layer encompasses the functionalities of the OSI model’s Session, Presentation, and Application layers.
Physical Layer, Transmission Media, Switching, and Multiplexing
Which transmission medium offers the highest bandwidth?
a) Twisted Pair
b) Coaxial Cable
c) Optical Fiber
d) Radio Waves
Answer: c) Optical Fiber
Explanation: Optical fiber provides the highest bandwidth and supports high-speed data transmission over long distances.What is the purpose of multiplexing in computer networks?
a) To increase packet loss
b) To combine multiple signals into a single transmission medium
c) To encrypt data
d) To filter network traffic
Answer: b) To combine multiple signals into a single transmission medium
Explanation: Multiplexing allows multiple signals to share a single medium, improving efficiency.
Data Link Layer, MAC Address, Multiple Access Protocols
What does CSMA/CD stand for in the context of multiple access protocols?
a) Carrier Sense Multiple Access with Collision Detection
b) Carrier Sense Multiple Access with Collision Avoidance
c) Controlled Sense Multiple Access with Collision Detection
d) Carrier Sense Multi-Protocol Access with Collision Detection
Answer: a) Carrier Sense Multiple Access with Collision Detection
Explanation: CSMA/CD is used in Ethernet networks to detect and manage collisions in shared media.What is the size of a MAC address?
a) 32 bits
b) 48 bits
c) 64 bits
d) 128 bits
Answer: b) 48 bits
Explanation: A MAC address is a 48-bit (6-byte) unique identifier assigned to network interfaces.
Network Devices: Repeaters, Hubs, Bridges, Switches, Routers, Gateways
Which device operates at the Network Layer (Layer 3) of the OSI model?
a) Hub
b) Switch
c) Router
d) Repeater
Answer: c) Router
Explanation: Routers operate at the Network Layer, making routing decisions based on IP addresses.What is the primary function of a bridge in a network?
a) Connects different network protocols
b) Filters and forwards frames based on MAC addresses
c) Amplifies signals
d) Routes packets between networks
Answer: b) Filters and forwards frames based on MAC addresses
Explanation: Bridges operate at the Data Link Layer, connecting LAN segments and filtering traffic using MAC addresses.
Network Layer, IP Addressing, Routing Protocols
Which of the following is a private IP address range?
a) 172.16.0.0 – 172.31.255.255
b) 192.0.0.0 – 192.255.255.255
c) 10.0.0.0 – 10.255.255.255
d) Both a and c
Answer: d) Both a and c
Explanation: Private IP address ranges include 10.0.0.0–10.255.255.255, 172.16.0.0–172.31.255.255, and 192.168.0.0–192.168.255.255.Which routing protocol is classified as a link-state protocol?
a) RIP
b) OSPF
c) EIGRP
d) BGP
Answer: b) OSPF
Explanation: OSPF (Open Shortest Path First) is a link-state routing protocol that uses Dijkstra’s algorithm for path computation.
IP Address Management, Autonomous System, Multi-homing
What is an Autonomous System (AS) in networking?
a) A collection of IP routing prefixes under a single administration
b) A group of computers in a LAN
c) A type of encryption protocol
d) A physical network device
Answer: a) A collection of IP routing prefixes under a single administration
Explanation: An AS is a group of IP networks managed by a single entity, identified by an AS number.What does multi-homing refer to in IP address management?
a) Using a single ISP for connectivity
b) Connecting a network to multiple ISPs for redundancy
c) Assigning multiple IP addresses to a single device
d) Using private IP addresses only
Answer: b) Connecting a network to multiple ISPs for redundancy
Explanation: Multi-homing enhances network reliability by connecting to multiple ISPs.
Transport Layer, TCP, and UDP Protocols
Which protocol provides reliable, connection-oriented data transfer?
a) UDP
b) TCP
c) IP
d) ICMP
Answer: b) TCP
Explanation: TCP ensures reliable data transfer with error checking and retransmission, unlike UDP, which is connectionless.What is the range of well-known port numbers used by the Transport Layer?
a) 0–1023
b) 1024–49151
c) 49152–65535
d) 65536–99999
Answer: a) 0–1023
Explanation: Well-known ports (0–1023) are reserved for standard protocols like HTTP (80) and FTP (21).
Application Layer Protocols
Which protocol is used for secure web browsing?
a) HTTP
b) HTTPS
c) FTP
d) SMTP
Answer: b) HTTPS
Explanation: HTTPS uses SSL/TLS to provide secure communication over the web.Which protocol is responsible for resolving domain names to IP addresses?
a) SMTP
b) DNS
c) POP
d) IMAP
Answer: b) DNS
Explanation: DNS (Domain Name System) translates domain names (e.g., www.example.com) to IP addresses.
Distributed Systems, Clusters, Network Security, Data Storage
What is a key characteristic of a distributed system?
a) Centralized control and single point of failure
b) Multiple interconnected computers working together
c) Limited to a single geographic location
d) No need for network connectivity
Answer: b) Multiple interconnected computers working together
Explanation: Distributed systems involve multiple nodes collaborating to achieve a common goal, often improving scalability and fault tolerance.What is the primary difference between NAS and SAN?
a) NAS uses block-level storage, while SAN uses file-level storage
b) NAS provides file-level storage, while SAN provides block-level storage
c) NAS is used only for backups, while SAN is used for real-time access
d) NAS is more expensive than SAN
Answer: b) NAS provides file-level storage, while SAN provides block-level storage
Explanation: NAS (Network Attached Storage) operates at the file level, while SAN (Storage Area Network) operates at the block level, often used for high-performance applications.
Network Security, Passive and Active Attacks, Cryptography
Which of the following is an example of a passive attack?
a) Man-in-the-Middle attack
b) Denial-of-Service attack
c) Eavesdropping
d) Packet injection
Answer: c) Eavesdropping
Explanation: Passive attacks, like eavesdropping, involve monitoring or intercepting data without altering it, unlike active attacks.Which cryptographic technique uses a single key for both encryption and decryption?
a) Asymmetric encryption
b) Symmetric encryption
c) Hashing
d) Digital signatures
Answer: b) Symmetric encryption
Explanation: Symmetric encryption, such as DES and AES, uses the same key for both encryption and decryption.
Symmetric and Asymmetric Encryption
Which of the following is a symmetric encryption algorithm?
a) RSA
b) AES
c) Diffie-Hellman
d) ECC
Answer: b) AES
Explanation: AES (Advanced Encryption Standard) is a symmetric encryption algorithm, while RSA and Diffie-Hellman are asymmetric.What is a key advantage of asymmetric encryption over symmetric encryption?
a) Faster processing speed
b) Uses a single key for simplicity
c) Enables secure key exchange over an insecure channel
d) Requires less computational power
Answer: c) Enables secure key exchange over an insecure channel
Explanation: Asymmetric encryption, using public and private keys, allows secure key exchange (e.g., Diffie-Hellman).
Cryptographic Hash Functions, Message Authentication Code, Digital Signature
What is the primary purpose of a cryptographic hash function?
a) To encrypt data for secure transmission
b) To generate a fixed-length output from variable-length input
c) To establish a secure connection
d) To authenticate users
Answer: b) To generate a fixed-length output from variable-length input
Explanation: Hash functions produce a fixed-length hash value, used for data integrity and authentication.What does a digital signature provide in network security?
a) Confidentiality
b) Integrity and authentication
c) Availability
d) Encryption
Answer: b) Integrity and authentication
Explanation: Digital signatures verify the authenticity and integrity of a message using asymmetric cryptography.
Securing Wireless LANs, VPN, Firewalls, IDS, and IPS
What is the primary function of an Intrusion Prevention System (IPS)?
a) To detect and log intrusions
b) To actively block malicious traffic
c) To encrypt wireless communications
d) To provide remote access
Answer: b) To actively block malicious traffic
Explanation: An IPS actively monitors and blocks malicious activities, unlike an IDS, which only detects and logs them.Which protocol is commonly used to secure Wireless LANs?
a) WEP
b) WPA3
c) FTP
d) SMTP
Answer: b) WPA3
Explanation: WPA3 is the latest standard for securing Wi-Fi networks, offering stronger encryption than WEP or WPA2.
Disaster Recovery, Data Backup, Fault Tolerance
What is a key component of a disaster recovery plan?
a) Regular software updates
b) Data backup and restoration procedures
c) Network performance optimization
d) User authentication protocols
Answer: b) Data backup and restoration procedures
Explanation: A disaster recovery plan includes strategies for data backup and restoration to ensure business continuity.What does fault tolerance in a network refer to?
a) Preventing all network failures
b) Ensuring continued operation despite hardware or software failures
c) Increasing network bandwidth
d) Encrypting all network traffic
Answer: b) Ensuring continued operation despite hardware or software failures
Explanation: Fault tolerance involves designing systems to remain operational during failures, often through redundancy.
Advanced Data Storage Techniques
Which storage technology is best suited for high-speed, low-latency access in enterprise environments?
a) NAS
b) SAN
c) Local hard drives
d) Tape storage
Answer: b) SAN
Explanation: SANs provide high-speed, block-level storage, ideal for enterprise applications requiring low latency.What is a benefit of clustering in data storage?
a) Reduces storage capacity
b) Improves scalability and reliability
c) Eliminates the need for backups
d) Decreases data access speed
Answer: b) Improves scalability and reliability
Explanation: Clustering enhances storage systems by distributing data across multiple nodes, improving performance and fault tolerance.
Network Troubleshooting and Support Tools
Which tool is commonly used to test network connectivity?
a) Ping
b) FTP
c) HTTP
d) SMTP
Answer: a) Ping
Explanation: Ping uses ICMP to test connectivity and measure round-trip time between devices.What is the purpose of establishing a network baseline?
a) To encrypt network traffic
b) To measure normal network performance for troubleshooting
c) To configure firewalls
d) To assign IP addresses
Answer: b) To measure normal network performance for troubleshooting
Explanation: A network baseline provides a reference for normal performance, aiding in identifying anomalies during troubleshooting.
Network Access Points, Common Components, and Peripheral Ports
What is the function of a Network Access Point (NAP)?
a) To connect end-user devices to a LAN
b) To serve as an interconnection point between ISPs
c) To encrypt network traffic
d) To store network data
Answer: b) To serve as an interconnection point between ISPs
Explanation: NAPs facilitate data exchange between different Internet Service Providers.Which port is commonly used for USB connections in networking peripherals?
a) RJ45
b) USB-A
c) HDMI
d) VGA
Answer: b) USB-A
Explanation: USB-A is a standard peripheral port used for connecting devices like network adapters or external drives.
Comments
Post a Comment