Computer Network Assignment PDF
Document Details
Uploaded by FavorableUnderstanding9332
VIT Vellore
Infee Tripathi
Tags
Summary
This document contains a computer network assignment. It includes questions about different network types, protocols, and other networking concepts.
Full Transcript
Computer Networks Infeepedia By: Infee Tripathi Assignment - #1(Types, Transmission media&mode,OSI Model/Protocols) Computer Networks 1. Which type of...
Computer Networks Infeepedia By: Infee Tripathi Assignment - #1(Types, Transmission media&mode,OSI Model/Protocols) Computer Networks 1. Which type of network is typically confined to a 7. Which network type is best suited for home automation single building or campus? systems? A. WAN A. PAN B. MAN B. HAN C. LAN C. CAN D. More than one of the above D. More than one of the above E. None of the above E. None of the above 2. Which network spans a city or a large campus? 8. Which network type provides secure connectivity over a A. PAN public network? B. MAN A. VPN C. LAN B. EPN D. More than one of the above C. WLAN E. None of the above D. More than one of the above E. None of the above 3. Which protocol is used to translate domain names into IP addresses? 9. What does WLAN stand for? A. ARP A. Wide Local Area Network B. DNS B. Wireless Local Area Network C. DHCP C. Wide Logical Area Network D. More than one of the above D. More than one of the above E. None of the above E. None of the above 4. Which network type is primarily used for personal 10. Which network is designed for secure communication within devices within a range of a few meters? an organization? A. LAN A. Intranet B. PAN B. Extranet C. WAN C. Internet D. More than one of the above D. More than one of the above E. None of the above E. None of the above 5. Which type of network is designed for educational 11. What is the primary difference between an Extranet and an institutions or corporate campuses? Intranet? A. CAN A. Extranet is publicly accessible B. MAN B. Extranet allows limited external access C. WAN C. Intranet uses wireless technology D. More than one of the above D. More than one of the above E. None of the above E. None of the above 6. What does SAN stand for in networking? 12. Which topology connects all devices in a circular A. System Area Network arrangement? B. Storage Area Network A. Star C. Secure Area Network B. Ring D. More than one of the above C. Mesh E. None of the above D. More than one of the above E. None of the above Subscribe Infeepedia youtube channel for computer science competitive exams Download Infeepedia app and call or wapp on 8004391758 Computer Networks Infeepedia By: Infee Tripathi 13. Which of the following protocols is used for file 19. Which network is used to connect storage devices in a transfer? dedicated manner? A. FTP A. SAN B. TFTP B. CAN C. SCP C. VPN D. More than one of the above D. More than one of the above E. None of the above E. None of the above 14. Which topology provides multiple paths for data 20. What is the main purpose of a VPN? transmission? A. To connect storage devices A. Mesh B. To secure communication over public networks B. Star C. To connect devices within a home C. Ring D. More than one of the above D. More than one of the above E. None of the above E. None of the above 21. Which topology requires a terminator at both ends of the communication line? 15. Which protocol is used for sending emails? A. Bus A. HTTP B. Ring B. SMTP C. Star C. FTP D. More than one of the above D. More than one of the above E. None of the above E. None of the above 22. Which protocol is used for secure communication on the 16. Which network topology is most cost-effective for web? small networks? A. HTTPS A. Star B. SSH B. Bus C. TLS C. Mesh D. More than one of the above D. More than one of the above E. None of the above E. None of the above 23. Which network type is commonly used for connecting IoT 17. Which of the following protocols is primarily used devices in a home? for web browsing? A. HAN A. HTTP B. PAN B. FTP C. WLAN C. Telnet D. More than one of the above D. More than one of the above E. None of the above E. None of the above 24. What is the primary purpose of an Extranet? 18. What is a key characteristic of a Mesh topology? A. To provide public access to resources A. All devices are connected to a central hub B. To allow external users limited access to an organization's B. Devices are connected in a linear sequence network C. Devices have multiple connections to other devices C. To connect personal devices within a short range D. More than one of the above D. More than one of the above E. None of the above E. None of the above 25. Which topology combines the characteristics of Star and Bus topologies? A. Mesh B. Hybrid C. Ring D. More than one of the above E. None of the above Subscribe Infeepedia youtube channel for computer science competitive exams Download Infeepedia app and call or wapp on 8004391758 Computer Networks Infeepedia By: Infee Tripathi 26. Which protocol is used for real-time voice 32. Which of the following is NOT an example of guided communication? transmission media? A. RTP A. Coaxial cable B. SIP B. Fiber-optic cable C. VoIP C. Twisted-pair cable D. More than one of the above D. Radio waves E. None of the above E. None of the above 27. What does EPN stand for? 33. What type of signal is used in traditional telephony A. Enterprise Private Network systems? B. Extended Public Network A. Analog signal C. Encrypted Private Network B. Digital signal D. More than one of the above C. Both A and B E. None of the above D. More than one of the above E. None of the above 28. Which topology is most resilient to node failures? A. Ring 34. Which of the following devices operates at the Data Link B. Mesh layer of the OSI model? C. Star A. Router D. More than one of the above B. Switch E. None of the above C. Hub D. More than one of the above 29. Which type of network is specifically designed for E. None of the above high-performance computing clusters? A. Storage area Network 35. Which of the following switching techniques uses a B. System Area Network dedicated communication path between sender and C. CAN receiver? D. More than one of the above A. Circuit switching E. None of the above B. Packet switching C. Message switching 30. Which protocol is commonly used for retrieving D. More than one of the above emails from a server? E. None of the above A. SMTP B. IMAP 36. Which transmission mode is most suitable for video C. POP3 conferencing? D. More than one of the above A. Simplex E. None of the above B. Half-duplex C. Full-duplex 31. Which of the following is a transmission mode where D. More than one of the above data flows in both directions, but only one direction E. None of the above at a time? A. Simplex 37. Which of the following is NOT true about fiber-optic cables? B. Half-duplex A. Immune to electromagnetic interference C. Full-duplex B. High bandwidth D. More than one of the above C. Susceptible to crosstalk E. None of the above D. Made of glass or plastic E. None of the above Subscribe Infeepedia youtube channel for computer science competitive exams Download Infeepedia app and call or wapp on 8004391758 Computer Networks Infeepedia By: Infee Tripathi 38. Which protocol is used for network management 44. Which device connects two LAN segments and filters traffic and monitoring? based on MAC addresses? A. SNMP A. Repeater B. ICMP B. Bridge C. Telnet C. Hub D. More than one of the above D. More than one of the above E. None of the above E. None of the above 39. Which of the following is a key difference between 45. Which of the following best describes frequency-division analog and digital signals? multiplexing (FDM)? A. Analog signals are discrete, while digital signals A. Multiple signals are combined based on time slots. are continuous. B. Multiple signals are transmitted on different frequency B. Digital signals are discrete, while analog signals bands. are continuous. C. Signals are transmitted sequentially in a round-robin C. Analog signals are immune to noise, while digital manner. signals are not. D. More than one of the abov. D. More than one of the above E. None of the above E. None of the above 46. Which switching technique stores the entire message 40. Which switching technique is most commonly used before forwarding it to the destination? in the Internet? A. Circuit switching A. Circuit switching B. Packet switching B. Packet switching C. Message switching C. Message switching D. More than one of the above D. More than one of the above E. None of the above E. None of the above 47. What is the primary disadvantage of circuit switching? 41. Which device is used to regenerate and amplify A. High latency for real-time communication signals in a network? B. Inefficient use of bandwidth A. Hub C. Data loss during transmission B. Repeater D. More than one of the above C. Bridge E. None of the above D. More than one of the above E. None of the above 48. Which of the following is a disadvantage of unguided transmission media? 42. Which transmission medium is most suitable for A. High susceptibility to interference long-distance communication with minimal signal B. Limited mobility loss? C. High installation cost A. Twisted-pair cable D. More than one of the above B. Coaxial cable E. None of the above C. Fiber-optic cable D. More than one of the above 49. Which of the following is NOT a characteristic of digital E. None of the above signals? A. Noise resistance 43. Which of the following transmission media is most B. Continuous waveform susceptible to electromagnetic interference? C. Represented by binary values A. Twisted-pair cable D. More than one of the above B. Coaxial cable E. None of the above C. Fiber-optic cable D. More than one of the above E. None of the above Subscribe Infeepedia youtube channel for computer science competitive exams Download Infeepedia app and call or wapp on 8004391758 Computer Networks Infeepedia By: Infee Tripathi 50. Which network device is responsible for dividing a 56. Which of the following devices works as a central connection network into multiple collision domains? point in a star topology? A. Hub A. Hub B. Switch B. Switch C. Router C. Router D. More than one of the above D. More than one of the above E. None of the above E. None of the above 51. Which switching technique delivers data packets 57. Which property of digital signals makes them preferable for independently without maintaining a dedicated long-distance communication? path? A. Continuous waveform A. Circuit switching B. Noise resistance B. Packet switching C. High signal attenuation C. Message switching D. More than one of the above D. More than one of the above E. None of the above E. None of the above 58. Which of the following is true about analog signals? 52. Which transmission mode is ideal for broadcasting a A. They use discrete values. TV signal? B. They are less affected by noise. A. Simplex C. They are continuous waveforms. B. Half-duplex D. More than one of the above C. Full-duplex E. None of the above D. More than one of the above E. None of the above 59. Which switching technique is most efficient for transmitting large files? 53. Which of the following devices operates at the A. Circuit switching Network layer of the OSI model? B. Packet switching A. Router C. Message switching B. Switch D. More than one of the above C. Bridge E. None of the above D. More than one of the above E. None of the above 60. Which of the following is a characteristic of packet switching? 54. Which switching technique is best suited for real- A. Dedicated communication path time voice and video communication? B. Data divided into packets A. Circuit switching C. High latency for real-time applications B. Packet switching D. More than one of the above C. Message switching E. None of the above D. More than one of the above E. None of the above 61. Which layer of the OSI model is responsible for error detection and correction? 55. Which type of multiplexing is commonly used in A. Network Layer optical fiber communication? B. Data Link Layer A. Time-division multiplexing (TDM) C. Transport Layer B. Frequency-division multiplexing (FDM) D. More than one of the above C. Wavelength-division multiplexing (WDM) E. None of the above D. More than one of the above E. None of the above Subscribe Infeepedia youtube channel for computer science competitive exams Download Infeepedia app and call or wapp on 8004391758 Computer Networks Infeepedia By: Infee Tripathi 62. Which OSI layer is responsible for establishing, 68. Which OSI layer handles flow control and segmentation of managing, and terminating communication data? sessions? A. Transport Layer A. Transport Layer B. Data Link Layer B. Session Layer C. Network Layer C. Presentation Layer D. More than one of the above D. More than one of the above E. None of the above E. None of the above 69. Which device operates at the Physical Layer of the OSI 63. Which device connects multiple networks and model? directs data packets based on IP addresses? A. Repeater A. Switch B. Router B. Router C. Firewall C. Gateway D. More than one of the above D. More than one of the above E. None of the above E. None of the above 70. Which OSI layer is responsible for ensuring data integrity and 64. Which OSI layer is responsible for converting data reliable communication? into a format suitable for transmission? A. Transport Layer A. Application Layer B. Network Layer B. Presentation Layer C. Session Layer C. Transport Layer D. More than one of the above D. More than one of the above E. None of the above E. None of the above 71. Which of the following protocols operate at the Application 65. Which of the following devices can provide network Layer of the OSI model? security by filtering incoming and outgoing traffic? A. HTTP A. Firewall B. FTP B. Modem C. SMTP C. NIC D. More than one of the above D. More than one of the above E. None of the above E. None of the above 72. What is the primary function of the Network Interface Card 66. Which OSI layer is responsible for routing and (NIC)? forwarding data packets? A. Data encryption A. Transport Layer B. Network connectivity B. Network Layer C. Routing C. Data Link Layer D. More than one of the above D. More than one of the above E. None of the above E. None of the above 73. Which OSI layer is responsible for data compression and 67. What is the primary function of a gateway in a encryption? network? A. Session Layer A. Connect devices within a LAN B. Presentation Layer B. Connect networks using different protocols C. Application Layer C. Filter network traffic D. More than one of the above D. More than one of the above E. None of the above E. None of the above Subscribe Infeepedia youtube channel for computer science competitive exams Download Infeepedia app and call or wapp on 8004391758 Computer Networks Infeepedia By: Infee Tripathi 74. Which OSI layer converts data into signals suitable 80. Which of the following devices works at the Application for transmission over the physical medium? Layer of the OSI model? A. Network Layer A. Gateway B. Physical Layer B. Firewall C. Data Link Layer C. Modem D. More than one of the above D. More than one of the above E. None of the above E. None of the above 75. Which of the following devices operates at multiple 81. Which OSI layer is responsible for managing hardware OSI layers? transmission errors? A. Gateway A. Physical Layer B. Repeater B. Data Link Layer C. Hub C. Network Layer D. More than one of the above D. More than one of the above E. None of the above E. None of the above 76. Which layer of the OSI model is responsible for 82. What is the primary role of a firewall in a network? packet forwarding, including routing? A. Data encryption A. Transport Layer B. Packet filtering B. Network Layer C. Signal amplification C. Data Link Layer D. More than one of the above D. More than one of the above E. None of the above E. None of the above 83. Which OSI layer defines the electrical and mechanical 77. What is the role of the Session Layer in the OSI characteristics of the network? model? A. Data Link Layer A. Data segmentation B. Physical Layer B. Synchronization of communication C. Network Layer C. Address resolution D. More than one of the above D. More than one of the above E. None of the above E. None of the above 84. Which OSI layer provides services like email, file transfer, and 78. Which OSI layer is responsible for framing and remote login? physical addressing? A. Application Layer A. Data Link Layer B. Presentation Layer B. Network Layer C. Session Layer C. Transport Layer D. More than one of the above D. More than one of the above E. None of the above E. None of the above 85. At which OSI layer does a modem primarily operate? A. Physical Layer 79. Which layer of the OSI model ensures end-to-end B. Data Link Layer delivery of data? C. Network Layer A. Network Layer D. More than one of the above B. Transport Layer E. None of the above C. Data Link Layer D. More than one of the above 86. Which OSI layer is responsible for logical addressing and path E. None of the above determination? A. Data Link Layer B. Network Layer C. Transport Layer D. More than one of the above E. None of the above Subscribe Infeepedia youtube channel for computer science competitive exams Download Infeepedia app and call or wapp on 8004391758 Computer Networks Infeepedia By: Infee Tripathi 87. Which device acts as a central point for wireless 93. What is the primary purpose of Access Control Lists (ACLs)? devices to connect to a network? A. Manage user authentication A. Firewall B. Define permissions for resources B. Access Point C. Encrypt sensitive data C. Switch D. More than one of the above D. More than one of the above E. None of the above E. None of the above 94. Which of the following techniques is used for error 88. Which OSI layer is responsible for breaking data detection? into smaller segments for transmission? A. CRC A. Data Link Layer B. Checksum B. Transport Layer C. Hamming Code C. Network Layer D. More than one of the above D. More than one of the above E. None of the above E. None of the above 95. What is a characteristic of firewalls? 89. What is the primary function of a Network Interface A. Operates only at the Physical Layer Card (NIC)? B. Blocks unauthorized access A. Enables network connectivity C. Amplifies network signals B. Provides data encryption D. More than one of the above C. Manages error correction E. None of the above D. More than one of the above E. None of the above 96. Which error correction technique is suitable for correcting burst errors? 90. Which of the following is a function of a firewall in a A. Hamming Code network? B. Reed-Solomon Code A. Packet filtering C. Parity Check B. Signal amplification D. More than one of the above C. Data compression E. None of the above D. More than one of the above E. None of the above 97. What is the primary function of a checksum? A. Error detection 91. Which error detection technique uses parity bits to B. Error correction identify errors? C. Data encryption A. CRC D. More than one of the above B. Checksum E. None of the above C. Parity Check D. More than one of the above 98. Which error detection technique is most suitable for E. None of the above detecting burst errors? A. Parity Check 92. Which error correction technique uses redundant B. CRC bits to fix errors? C. Checksum A. Hamming Code D. More than one of the above B. Parity Check E. None of the above C. Cyclic Redundancy Check (CRC) D. More than one of the above 99. What is a key advantage of using firewalls? E. None of the above A. Enhanced data compression B. Prevention of unauthorized access C. Amplification of network signals D. More than one of the above E. None of the above Subscribe Infeepedia youtube channel for computer science competitive exams Download Infeepedia app and call or wapp on 8004391758 Computer Networks Infeepedia By: Infee Tripathi 100. Which of the following is NOT an error detection 107. Which protocol is used for real-time communication at the technique? transport layer? A. CRC A. TCP B. Checksum B. UDP C. Hamming Code C. SCTP D. More than one of the above D. More than one of the above E. None of the above E. None of the above 101. Which protocol is responsible for logical 108. Which sublayer handles access to the physical medium? addressing in the network layer? A. LLC A. IP B. MAC B. ARP C. Transport C. ICMP D. More than one of the above D. More than one of the above E. None of the above E. None of the above 109. Which protocol is used for connectionless communication 102. Which protocol is used to map IP addresses to at the transport layer? MAC addresses? A. TCP A. ICMP B. UDP B. ARP C. SCTP C. RARP D. More than one of the above D. More than one of the above E. None of the above E. None of the above 103. Which protocol provides error reporting and 110. Which sublayer of the data link layer is responsible for error diagnostics at the network layer? detection? A. IP A. LLC B. ICMP B. MAC C. OSPF C. Network D. More than one of the above D. More than one of the above E. None of the above E. None of the above 104. Which protocol is used for routing within an 111. Which protocol is responsible for logical addressing in the autonomous system? network layer? A. RIP A. IP B. OSPF B. ARP C. BGP C. ICMP D. More than one of the above D. More than one of the above E. None of the above E. None of the above 105. Which protocol is used to route multicast traffic? 112. Which protocol is used to map IP addresses to MAC A. IGMP addresses? B. PIM A. ICMP C. RIP B. ARP D. More than one of the above C. RARP E. None of the above D. More than one of the above 106. Which protocol provides reliable communication E. None of the above at the transport layer? A. UDP B. TCP C. ICMP D. More than one of the above E. None of the above Subscribe Infeepedia youtube channel for computer science competitive exams Download Infeepedia app and call or wapp on 8004391758 Computer Networks Infeepedia By: Infee Tripathi 113. Which protocol provides error reporting and diagnostics at the network layer? A. IP B. ICMP C. OSPF D. More than one of the above E. None of the above 114. Which protocol is used for downloading emails from a mail server to a local client? A. SMTP B. POP3 C. IMAP D. More than one of the above E. None of the above 115. Which protocol is used to route multicast traffic? A. IGMP B. PIM C. RIP D. More than one of the above E. None of the above Subscribe Infeepedia youtube channel for computer science competitive exams Download Infeepedia app and call or wapp on 8004391758 Computer Networks Infeepedia By: Infee Tripathi Answer With Explanation 1. Answer: C. LAN 9. Answer: B. Wireless Local Area Network Explanation: A Local Area Network (LAN) is designed for Explanation: A WLAN is a type of LAN that uses wireless small geographical areas, such as a building or campus. It communication technology, such as Wi-Fi, to connect enables high-speed communication and resource sharing devices. It provides the flexibility of mobility within a within a limited space. Unlike WANs and MANs, LANs are limited area while maintaining network connectivity. typically privately owned and operated. 10. Answer: A. Intranet 2. Answer: B. MAN Explanation: An Intranet is a private network used within Explanation: A Metropolitan Area Network (MAN) covers a an organization to share information and resources city or large campus, providing connectivity over a larger securely. It is typically isolated from external access, area than LAN but smaller than WAN. MANs often use unlike the Internet. high-speed technologies like fiber optics to interconnect various LANs within a metropolitan region. 11. Answer: B. Extranet allows limited external access Explanation: An Extranet is an extension of an Intranet 3. Answer: B. DNS that provides secure access to external users, such as Explanation: The Domain Name System (DNS) is business partners or clients. It is designed to facilitate responsible for converting human-readable domain names collaboration while maintaining security protocols. (e.g., www.example.com) into machine-readable IP addresses. ARP maps IP addresses to MAC addresses, and 12. Answer: B. Ring DHCP assigns IP addresses dynamically. DNS is critical for Explanation: In a Ring topology, each device is connected the functioning of the Internet, enabling user-friendly to exactly two other devices, forming a circular data addressing. path. Data travels in one direction, reducing collisions 4. Answer: B. PAN but making the network vulnerable to a single point of Explanation: A Personal Area Network (PAN) is a small failure. network used for connecting personal devices like smartphones, tablets, and laptops within a short range, 13. Answer: D. More than one of the above typically up to 10 meters. Bluetooth and Infrared Explanation: FTP (File Transfer Protocol) is widely used technologies are common in PANs. for transferring files over a network. TFTP (Trivial File Transfer Protocol) is a simplified version of FTP that does 5. Answer: A. CAN not require authentication. SCP (Secure Copy Protocol) is Explanation: A Campus Area Network (CAN) interconnects used for secure file transfers using SSH. All these multiple LANs within a specific campus, such as a protocols are designed for file transfer but differ in university or corporate office. It is smaller than a MAN and complexity and security. typically uses high-speed connections to provide efficient communication. 14. Answer: A. Mesh Explanation: A Mesh topology connects devices in such a 6. Answer: D. More than one of the above way that multiple paths exist for data transmission. This Explanation: SAN can refer to both Storage Area Network ensures high reliability and fault tolerance, as data can and System Area Network. A Storage Area Network is used take alternate routes if one path fails. for block-level data storage, while a System Area Network connects high-performance computing resources. 15. Answer: B. SMTP 7. Answer: B. HAN Explanation: The Simple Mail Transfer Protocol (SMTP) is Explanation: A Home Area Network (HAN) connects used for sending emails. It operates at the application devices within a home, such as smart appliances, security layer and facilitates the transmission of messages systems, and personal computers. It enables centralized between email servers. SMTP uses a client-server model control and communication among these devices. and often works alongside POP3 or IMAP for retrieving 8. Answer: A. VPN emails. HTTP is for web browsing, and FTP is for file Explanation: A Virtual Private Network (VPN) creates a transfer. SMTP ensures reliable delivery of emails secure, encrypted connection over a public network like through a series of commands and responses between the internet. It is commonly used for remote access and mail servers. protecting sensitive data during transmission. Subscribe Infeepedia youtube channel for computer science competitive exams Download Infeepedia app and call or wapp on 8004391758 Computer Networks Infeepedia By: Infee Tripathi 16. Answer: B. Bus 23. Answer: D. More than one of the above Explanation: In a Bus topology, all devices are connected Explanation: Both HAN (Home Area Network) and WLAN to a single communication line or cable. This topology is (Wireless Local Area Network) are used to connect IoT cost-effective due to minimal cabling and is suitable for devices in homes. HAN focuses on smart appliances and small networks. However, it may face performance issues automation, while WLAN provides wireless connectivity. as the network grows. 24. Answer: B. To allow external users limited access to an 17. Answer: A. HTTP organization's network Explanation: Hypertext Transfer Protocol (HTTP) is the Explanation: An Extranet extends an organization's foundation of data communication for the World Wide Intranet to external users, such as clients or partners, Web. It is used to load web pages using hypertext links. providing controlled access to specific resources while HTTP defines how messages are formatted and maintaining security. transmitted, and how web servers and browsers should respond to requests. FTP is used for file transfers, and 25. Answer: B. Hybrid Telnet is used for terminal emulation. Explanation: A Hybrid topology integrates features of 18. Answer: C. Devices have multiple connections to other multiple topologies, such as Star and Bus. It offers devices flexibility and scalability, making it suitable for complex Explanation: In a Mesh topology, each device is connected networks. to multiple other devices, ensuring high redundancy and reliability. This topology is ideal for critical networks 26. Answer: D. More than one of the above where downtime is unacceptable. Explanation: RTP (Real-Time Protocol) and SIP (Session Initiation Protocol) are critical for voice and video 19. Answer: A. SAN communication over IP networks. RTP handles the Explanation: A Storage Area Network (SAN) is designed for transport of audio and video streams, while SIP manages block-level data storage. It connects storage devices like the signaling for establishing, maintaining, and disk arrays and tape libraries to servers, ensuring high- terminating communication sessions. VoIP (Voice over speed and reliable access to data. IP) is an application of these protocols. 20. Answer: B. To secure communication over public 27. Answer: A. Enterprise Private Network networks Explanation: An Enterprise Private Network (EPN) is a Explanation: A Virtual Private Network (VPN) creates an private network used by organizations to securely encrypted connection over a public network like the connect various branches and offices. It ensures efficient Internet. It ensures data privacy and security, often used and secure communication across the enterprise. for remote work and accessing restricted resources. 28. Answer: B. Mesh 21. Answer: A. Bus Explanation: Mesh topology is highly resilient because it Explanation: In a Bus topology, a single communication provides multiple paths for data transmission. If one line connects all devices, and terminators are required at node or connection fails, data can still be transmitted both ends to prevent signal reflection. Without through alternate paths. terminators, data transmission would be disrupted. 29. Answer: B. System Area Network 22. Answer: D. More than one of the above Explanation: A System Area Network (SAN) connects Explanation: HTTPS (Hypertext Transfer Protocol Secure) is high-performance computing nodes in a cluster, HTTP combined with encryption provided by TLS providing low-latency and high-bandwidth (Transport Layer Security). TLS ensures data integrity and communication. It is commonly used in supercomputing confidentiality over the network. SSH (Secure Shell) is not environments. for web communication but provides secure remote access. Both HTTPS and TLS contribute to secure communication in web applications. Subscribe Infeepedia youtube channel for computer science competitive exams Download Infeepedia app and call or wapp on 8004391758 Computer Networks Infeepedia By: Infee Tripathi 30. Answer: D. More than one of the above 37. Answer: C. Susceptible to crosstalk Explanation: IMAP (Internet Message Access Protocol) and Explanation: Fiber-optic cables are immune to crosstalk POP3 (Post Office Protocol) are both used for retrieving and electromagnetic interference because they use light emails from a server. IMAP allows users to manage emails to transmit data. They offer high bandwidth and are directly on the server, enabling access from multiple made of glass or plastic, making them ideal for high- devices. POP3 downloads emails to the local device and speed communication. typically deletes them from the server. SMTP, on the other hand, is used for sending emails. 38. Answer: A. SNMP Explanation: A widely used protocol for managing and 31. Answer: B. Half-duplex monitoring network devices on a (LAN) or (WAN). ICMP Explanation: Half-duplex transmission allows data to flow is used for error handling and network diagnostics. The in both directions, but only one direction at a time. For Teletype Network Protocol is used to provide a example, a walkie-talkie works in half-duplex mode, command line interface for communication with a where one person speaks while the other listens. Simplex remote device or server. allows data flow in one direction only, while full-duplex enables simultaneous two-way communication. 39. Answer: B. Digital signals are discrete, while analog signals are continuous. 32. Answer: D. Radio waves Explanation: Analog signals represent data with Explanation: Guided transmission media involves physical continuous waveforms, while digital signals use discrete pathways like cables (e.g., coaxial, twisted-pair, and fiber- binary values (0s and 1s). Digital signals are more optic). Radio waves are part of unguided media, where immune to noise compared to analog signals. signals travel through the air without a physical conductor. 40. Answer: B. Packet switching 33. Answer: A. Analog signal Explanation: The Internet relies on packet switching, Explanation: Traditional telephony systems rely on analog where data is divided into packets and transmitted signals to transmit voice data. Analog signals vary independently. This technique is efficient and robust, continuously over time. Modern telephony, however, allowing multiple devices to share the network often uses digital signals for enhanced quality and simultaneously. reliability. 41. Answer: B. Repeater 34. Answer: B. Switch Explanation: Repeaters regenerate and amplify signals to Explanation: Switches operate at the Data Link layer (Layer extend the range of a network. They operate at the 2) of the OSI model, forwarding data based on MAC Physical layer of the OSI model. Hubs do not amplify addresses. Routers operate at the Network layer (Layer 3), signals but act as basic connection points. and hubs are physical layer devices 42. Answer: C. Fiber-optic cable Explanation: Fiber-optic cables are ideal for long-distance 35. Answer: A. Circuit switching communication due to their low signal attenuation and Explanation: Circuit switching establishes a dedicated immunity to electromagnetic interference. Twisted-pair communication path for the duration of a session, and coaxial cables are more prone to signal loss over ensuring consistent bandwidth and latency. Packet long distances. switching divides data into packets, while message switching sends the entire message without a dedicated 43. Answer: A. Twisted-pair cable path. Explanation: Twisted-pair cables, commonly used in local area networks (LANs), are more susceptible to 36. Answer: C. Full-duplex electromagnetic interference compared to coaxial and Explanation: Full-duplex transmission allows simultaneous fiber-optic cables. Shielded twisted-pair (STP) reduces two-way communication, which is essential for this vulnerability but not completely. applications like video conferencing. It ensures real-time 44. Answer: B. Bridge interaction without delays caused by switching directions. Explanation: A bridge connects two LAN segments and uses MAC addresses to filter and forward traffic. It operates at the Data Link layer (Layer 2) of the OSI model. Repeaters and hubs operate at the Physical layer. Subscribe Infeepedia youtube channel for computer science competitive exams Download Infeepedia app and call or wapp on 8004391758 Computer Networks Infeepedia By: Infee Tripathi 45. Answer: B. Multiple signals are transmitted on different 52. Answer: A. Simplex frequency bands. Explanation: Broadcasting a TV signal is a one-way Explanation: FDM allows multiple signals to be communication process, making simplex mode the most transmitted simultaneously by allocating separate suitable. The signal flows from the broadcaster to frequency bands to each signal. It is commonly used in viewers without requiring a return path. radio and television broadcasting. Time-division multiplexing (TDM) uses time slots instead of frequency 53. Answer: A. Router bands. Explanation: Routers operate at the Network layer (Layer 3) of the OSI model, making routing decisions based on 46. Answer: C. Message switching IP addresses. Switches and bridges operate at the Data Explanation: In message switching, the entire message is Link layer (Layer 2). stored at intermediate nodes before being forwarded to the next node. This technique can cause delays but 54. Answer: A. Circuit switching ensures reliable delivery. Circuit switching and packet Explanation: Circuit switching provides a dedicated path switching do not use this approach. for the duration of the communication session, ensuring consistent bandwidth and low latency, which are 47. Answer: B. Inefficient use of bandwidth essential for real-time voice and video communication. Explanation: Circuit switching establishes a dedicated path between sender and receiver for the entire session, even if 55. Answer: C. Wavelength-division multiplexing (WDM) no data is being transmitted. This leads to inefficient Explanation: WDM is a type of multiplexing used in bandwidth utilization. However, it ensures a consistent optical fiber communication, where multiple signals are connection with low latency, making it suitable for real- transmitted simultaneously on different wavelengths of time applications like voice calls. light. This technique maximizes the utilization of fiber- optic cables. 48. Answer: A. High susceptibility to interference Explanation: Unguided transmission media, such as radio 56. Answer: D. More than one of the above waves, are prone to electromagnetic interference and Explanation: Both hubs and switches can serve as central weather conditions. Despite offering mobility and ease of connection points in a star topology. Hubs are simpler installation, interference can degrade signal quality and devices that broadcast data to all ports, while switches reliability. intelligently forward data to the intended recipient. 49. Answer: B. Continuous waveform 57. Answer: B. Noise resistance Explanation: Digital signals are represented by discrete Explanation: Digital signals are less susceptible to noise binary values (0s and 1s) and are resistant to noise. and can be easily regenerated using repeaters, making Continuous waveforms are a characteristic of analog them suitable for long-distance communication. Analog signals, which vary smoothly over time. signals, on the other hand, degrade more significantly over distance. 50. Answer: B. Switch Explanation: A switch divides a network into multiple 58. Answer: C. They are continuous waveforms. collision domains, reducing the likelihood of data Explanation: Analog signals are represented by collisions. Each port on a switch represents a separate continuous waveforms that vary over time. They are collision domain. Routers divide networks into separate more affected by noise compared to digital signals, broadcast domains, while hubs do not segment collision which use discrete binary values. domains. 59. Answer: C. Message switching 51. Answer: B. Packet switching Explanation: Message switching stores and forwards the Explanation: Packet switching divides data into packets, entire message at intermediate nodes, ensuring reliable which are transmitted independently and may take delivery of large files. However, this technique may different routes to the destination. This technique is introduce delays, making it less suitable for real-time efficient and fault-tolerant, as it does not rely on a communication. dedicated path like circuit switching. Subscribe Infeepedia youtube channel for computer science competitive exams Download Infeepedia app and call or wapp on 8004391758 Computer Networks Infeepedia By: Infee Tripathi 60. Answer: D. More than one of the above 67. Answer: B. Connect networks using different protocols Explanation: Packet switching divides data into packets, Explanation: Gateways operate at multiple OSI layers which are transmitted independently. While it is efficient and connect networks using different communication and fault-tolerant, it may introduce latency, making it less protocols. They perform protocol conversion, allowing ideal for real-time applications compared to circuit devices on dissimilar networks to communicate. switching. Switches connect devices within a LAN, and firewalls filter traffic. 61. Answer: B. Data Link Layer Explanation: The Data Link Layer handles error detection 68. Answer: A. Transport Layer and correction through mechanisms like checksums and Explanation: The Transport Layer (Layer 4) manages flow CRC (Cyclic Redundancy Check). It ensures reliable data control, segmentation, and reassembly of data for transfer between adjacent nodes. The Transport Layer reliable communication. It uses protocols like TCP and handles end-to-end error control but does not perform UDP. The Data Link Layer handles flow control for local physical error correction. links, but segmentation is not its responsibility. 62. Answer: B. Session Layer 69. Answer: A. Repeater Explanation: The Session Layer (Layer 5) establishes, Explanation: Repeaters operate at the Physical Layer manages, and terminates communication sessions (Layer 1) by amplifying and retransmitting signals to between applications. It synchronizes data streams and extend the range of a network. They do not interpret ensures proper session handling in case of interruptions. data. Routers operate at the Network Layer, and The Transport Layer deals with data delivery, and the firewalls operate at higher layers. Presentation Layer focuses on data formatting. 70. Answer: A. Transport Layer 63. Answer: B. Router Explanation: The Transport Layer (Layer 4) ensures data Explanation: Routers operate at the Network Layer (Layer integrity and reliable communication through error 3) and connect multiple networks. They determine the detection, retransmission, and acknowledgment best path for data packets using routing tables and mechanisms. Protocols like TCP provide reliable data protocols. Switches connect devices within the same delivery, while UDP offers faster but less reliable network, while gateways can translate between different communication. network protocols. 71. Answer: D. More than one of the above 64. Answer: B. Presentation Layer Explanation: Protocols like HTTP (for web Explanation: The Presentation Layer (Layer 6) ensures that communication), FTP (for file transfer), and SMTP (for data is in a compatible format for transmission. It handles email) operate at the Application Layer (Layer 7). This encryption, compression, and translation of data. The layer provides services directly to end-users and Application Layer focuses on user interaction, while the applications. Transport Layer manages data delivery. 72. Answer: B. Network connectivity 65. Answer: A. Firewall Explanation: NICs enable devices to connect to a Explanation: Firewalls filter network traffic based on network by providing a physical and logical interface. predefined security rules, operating at multiple OSI layers, They operate at both the Physical Layer (Layer 1) and the including the Transport and Application Layers. NICs Data Link Layer (Layer 2). NICs handle MAC addressing (Network Interface Cards) facilitate network connectivity, and enable communication over wired or wireless and modems convert signals for internet access but do not media. provide traffic filtering. 66. Answer: B. Network Layer 73. Answer: B. Presentation Layer Explanation: The Network Layer (Layer 3) is responsible for Explanation: The Presentation Layer (Layer 6) handles routing and forwarding data packets between devices data compression and encryption to ensure secure and across different networks. It uses logical addressing (IP efficient data transmission. It transforms data into a addresses) and routing protocols like OSPF and BGP. The format suitable for the Application Layer, facilitating Transport Layer ensures reliable data delivery, while the compatibility between different systems. Data Link Layer handles local network data transfer. Subscribe Infeepedia youtube channel for computer science competitive exams Download Infeepedia app and call or wapp on 8004391758 Computer Networks Infeepedia By: Infee Tripathi 74. Answer: B. Physical Layer 82. Answer: B. Packet filtering Explanation: The Physical Layer (Layer 1) converts data Explanation: Firewalls filter packets based on predefined into electrical, optical, or radio signals for transmission security rules, preventing unauthorized access. They over physical media. It defines hardware specifications, operate at multiple OSI layers, including the Network such as cables, connectors, and transmission rates. and Transport Layers, to ensure secure data communication. 75. Answer: A. Gateway Explanation: Gateways operate at multiple OSI layers, 83. Answer: B. Physical Layer often from the Application Layer down to the Network Explanation: The Physical Layer (Layer 1) defines the Layer. They translate communication protocols, data hardware specifications, such as cables, connectors, and formats, or address schemes to enable communication voltage levels, for transmitting raw bits over the between dissimilar networks. network medium. 76. Answer: B. Network Layer 84. Answer: A. Application Layer Explanation: The Network Layer (Layer 3) is responsible for Explanation: The Application Layer (Layer 7) provides packet forwarding and routing. It determines the best network services directly to the end-user. Protocols like path for data packets using protocols like IP, OSPF, and HTTP, FTP, SMTP, and Telnet enable tasks such as email BGP. It also handles logical addressing through IP communication, file transfer, and remote system access. addresses. The Presentation Layer handles data formatting, and the Session Layer manages sessions. 77. Answer: B. Synchronization of communication Explanation: The Session Layer (Layer 5) manages sessions 85. Answer: A. Physical Layer between applications. It establishes, maintains, and Explanation: A modem operates at the Physical Layer terminates communication sessions and synchronizes data (Layer 1), converting digital signals into analog signals streams to ensure a smooth flow of information. (and vice versa) for transmission over telephone lines or other media. It does not interpret or route data, which is 78. Answer: A. Data Link Layer handled by higher layers. Explanation: The Data Link Layer (Layer 2) is responsible for framing, physical addressing (MAC addresses), and 86. Answer: B. Network Layer error detection. It ensures reliable data transfer between Explanation: The Network Layer (Layer 3) uses logical nodes on the same network segment. addressing (IP addresses) to identify devices and determine the best path for data transmission. Routing 79. Answer: B. Transport Layer protocols like OSPF and BGP enable efficient packet Explanation: The Transport Layer (Layer 4) ensures end-to- forwarding across interconnected networks. end delivery of data by managing error detection, flow control, and retransmissions. It uses protocols like TCP for 87. Answer: B. Access Point reliable communication and UDP for faster, connectionless Explanation: An Access Point (AP) acts as a central hub communication. for wireless devices, enabling them to connect to a wired network. It operates at the Data Link Layer (Layer 80. Answer: A. Gateway 2) and uses Wi-Fi protocols to facilitate communication Explanation: Gateways can operate at the Application between wireless and wired devices. Layer (Layer 7) by translating protocols and data formats between networks. Firewalls operate at higher layers for 88. Answer: B. Transport Layer traffic filtering, while modems work at the Physical Layer. Explanation: The Transport Layer (Layer 4) breaks data into smaller segments for transmission. It ensures 81. Answer: B. Data Link Layer reliable delivery through error detection and Explanation: The Data Link Layer (Layer 2) detects and retransmission mechanisms. The Network Layer handles corrects transmission errors using techniques like CRC. It routing, while the Data Link Layer focuses on framing ensures reliable communication over physical links, while and local data transfer. the Physical Layer handles raw data transmission. Subscribe Infeepedia youtube channel for computer science competitive exams Download Infeepedia app and call or wapp on 8004391758 Computer Networks Infeepedia By: Infee Tripathi 89. Answer: A. Enables network connectivity 96. Answer: B. Reed-Solomon Code Explanation: A NIC is a hardware component that connects Explanation: Reed-Solomon Code is an error correction a device to a network. It operates at the Physical and Data technique designed to correct burst errors, commonly Link layers of the OSI model, handling MAC addressing and used in CDs, DVDs, and QR codes. It works by adding enabling communication over wired or wireless networks. redundant data to ensure the recovery of original data NICs do not perform encryption or error correction even if a part is corrupted. directly, as these functions are handled by higher layers or other components. 97. Answer: A. Error detection Explanation: A checksum is used for error detection by 90. Answer: A. Packet filtering calculating the sum of data segments and appending it Explanation: A firewall acts as a security barrier, filtering to the data. The receiver recalculates the checksum and incoming and outgoing network traffic based on compares it with the transmitted one to detect errors. predefined rules. It operates at the Network and Transport 98. Answer: B. CRC layers, inspecting packets for malicious content or Explanation: CRC is highly effective for detecting burst unauthorized access. Signal amplification and data errors due to its polynomial division method. It can compression are not firewall functions. detect multiple bit errors within a block of data, making it more robust than parity checks or checksums. 91. Answer: C. Parity Check Explanation: Parity Check is a simple error detection 99. Answer: B. Prevention of unauthorized access method where a parity bit is added to the data. It ensures Explanation: Firewalls enhance network security by the total number of 1s in the data is either even (even blocking unauthorized access and filtering traffic based parity) or odd (odd parity). While effective for single-bit on predefined rules. They do not compress data or errors, it cannot detect multiple-bit errors. amplify signals, as these are unrelated functions. 92. Answer: A. Hamming Code 100. Answer: C. Hamming Code Explanation: Hamming Code is an error correction Explanation: Hamming Code is an error correction technique that adds redundant bits to data, enabling the technique, not an error detection method. CRC and detection and correction of single-bit errors. It uses parity Checksum are used for detecting errors during data bits at specific positions to determine the location of the transmission. error and correct it. 101. Answer: A. IP 93. Answer: B. Define permissions for resources Explanation: The Internet Protocol (IP) is the primary Explanation: ACLs specify which users or devices have protocol at the network layer, responsible for logical access to specific resources, such as files or network addressing and routing packets between devices. It segments. They are a key component of access control ensures that data packets are delivered to the correct systems, ensuring only authorized entities can access or destination using IP addresses. ARP resolves MAC modify data. Authentication and encryption are separate addresses, and ICMP handles error reporting and processes. diagnostics. 94. Answer: D. More than one of the above 102. Answer: B. ARP Explanation: Both CRC (Cyclic Redundancy Check) and Explanation:The Address Resolution Protocol (ARP) Checksum are error detection techniques. CRC uses maps IP addresses to MAC addresses in a local polynomial division to detect errors, while Checksum network. It ensures that packets sent at the network calculates the sum of data segments. Hamming Code, on layer reach the correct device at the data link layer. the other hand, is an error correction technique. RARP performs the reverse operation, mapping MAC addresses to IP addresses. 95. Answer: B. Blocks unauthorized access Explanation: Firewalls block unauthorized access to a network by filtering traffic based on predefined rules. They operate at multiple layers, primarily the Network and Transport layers. They do not amplify signals or operate at the Physical Layer. Subscribe Infeepedia youtube channel for computer science competitive exams Download Infeepedia app and call or wapp on 8004391758 Computer Networks Infeepedia By: Infee Tripathi 103. Answer: B. ICMP 110. Answer: B. LLC Explanation: The Internet Control Message Protocol Explanation: The LLC (Logical Link Control) sublayer (ICMP) is used for error reporting and network handles error detection and correction through diagnostics. For example, it is used in the "ping" techniques like CRC (Cyclic Redundancy Check), flow command to check connectivity. OSPF is a routing control and logical addressing. Network is not a data protocol, and IP is used for addressing and routing but link sublayer. does not handle diagnostics. 111. Answer: A. IP 104. Answer: D. More than one of the above Explanation:The Internet Protocol (IP) is the primary Explanation: Both RIP (Routing Information Protocol) and protocol at the network layer, responsible for logical OSPF (Open Shortest Path First) are used for routing addressing and routing packets between devices. It within an autonomous system. RIP uses distance-vector ensures that data packets are delivered to the correct routing, while OSPF uses link-state routing. BGP (Border destination using IP addresses. ARP resolves MAC Gateway Protocol) is used for routing between addresses, and ICMP handles error reporting and autonomous systems. diagnostics. 105. Answer: D. More than one of the above 112. Answer: B. ARP Explanation: IGMP (Internet Group Management Explanation: The Address Resolution Protocol (ARP) Protocol) manages multicast group memberships, while maps IP addresses to MAC addresses in a local PIM (Protocol Independent Multicast) routes multicast network. It ensures that packets sent at the network traffic efficiently. RIP is unrelated to multicast, as it is layer reach the correct device at the data link layer. used for unicast routing. RARP performs the reverse operation, mapping MAC addresses to IP addresses. 106 Answer: B. TCP Explanation: The Transmission Control Protocol (TCP) 113. Answer: B. ICMP ensures reliable communication through mechanisms like Explanation: The Internet Control Message Protocol acknowledgment, retransmission, and flow control. UDP (ICMP) is used for error reporting and network (User Datagram Protocol) is connectionless and does not diagnostics. For example, it is used in the "ping" guarantee reliability. ICMP operates at the network layer command to check connectivity. OSPF is a routing for error reporting. protocol, and IP is used for addressing and routing but does not handle diagnostics. 107. Answer: D. More than one of the above Explanation: UDP and SCTP (Stream Control Transmission 114. Answer: B. POP3 Protocol) are used for real-time communication. UDP is Explanation: POP3 (Post Office Protocol) used for lightweight and suitable for latency-sensitive applications downloading emails. POP3 downloads emails to the like VoIP. SCTP combines features of TCP and UDP, client and deletes them from the server, while IMAP providing reliability for multimedia and signaling. synchronizes emails across devices. SMTP is used for sending emails. 108. Answer: B. MAC Explanation: The MAC sublayer manages access to the 115. Answer: b. PIM physical medium, ensuring that multiple devices can Explanation: IGMP (Internet Group Management share the same channel without collisions. LLC operates Protocol) manages multicast group memberships, while above MAC, handling logical connections. Transport is a PIM (Protocol Independent Multicast) routes multicast higher-layer function. traffic efficiently. RIP is unrelated to multicast, as it is used for unicast routing. 109. Answer: B. UDP Explanation: UDP (User Datagram Protocol) is a connectionless protocol that sends data without establishing a connection. It is lightweight and suitable for applications like DNS queries and video streaming. TCP and SCTP are connection-oriented. Subscribe Infeepedia youtube channel for computer science competitive exams Download Infeepedia app and call or wapp on 8004391758 Computer Networks Infeepedia By: Infee Tripathi Subscribe Infeepedia youtube channel for computer science competitive exams Download Infeepedia app and call or wapp on 8004391758