Sei sulla pagina 1di 7

Networking Essential

M.Marks:60
Ques.1:
1.
2.
3.
4.
5.
6.
Ques.2:
1.
2.
3.
4.
5.
Ques.3:
1.
2.
3.
4.
5.
Ques.4:
1.
2.
3.
4.
5.
Ques.5:
Three)
1.
2.
3.
4.
Ques.6:
1.
2.
3.
4.
Ques.7:
1.
2.
3.
4.
5.
Ques.8:

Questions: 60

Time: 60 minutes

Multiple Choices
Which of the following are the protocols? (Select Three)
TCP/IP
NETBDUI
NETBEUI
TCP/IB
IPX/SPX
UDP
Characteristics of Hub are? (Select Three)
Full Duplex
Half Dulpex
One Collision Domain
Multiple Collision Domains
One Broadcast Domain
A Frame of data sent to a particular PC is made up of :( Select Four)
Source MAC address
Destination MAC address
Data
Error Checking
None of the above.
Select the network component :( Select Appropriate)
Host
Server
Client
Transmission Media
Node
Connectivity devices found within the Network Layer include :( Select
Routers
Brouters (acting as router)
Layer 3 switches
HUB
What is required to view a web page? (Select Two)
IE Explorer
Netscape
Motorola
Buddy
NIC contains various elements like. (Select Four)
Expansion bus connector
Media Connector
Buffer
Transceiver
None of the above
NIC have a unique hardware or physical address, which is called as
__________. (Select One)

1.
2.
3.
4.
Ques.9:
1.
2.
3.
4.
5.
Ques.10:
1.
2.
3.
4.
5.
Ques.11:
1.
2.
3.
4.
5.
Ques.12:
1.
2.
3.
4.
Ques.13:
Three)
1.
2.
3.
4.
5.
Ques.14:
1.
2.
3.
4.
5.
Ques.15:
1.
2.
3.
4.
Ques.16:
1.
2.
3.
4.
Ques.17:
1.
2.

TCP/IP address
Media Access Control (MAC)
Ethernet Address (EA)
All of the above.
The main advantages of a server based system :( Select Appropriate)
Performance
Security
Administration
Scalability
Flexibility
Which Protocols are work in an Application Layer? (Choose Three)
FTP (File Transfer Protocol)
SMTP (Simple Mail Transfer Protocol)
OSPF (Open Shorted Path First)
RIP (Routing Information Protocol)
HTTP (Hyper Text Transfer Protocol)
Which of the followings are routing protocols? (Choose Three)
RIP
OSPF
DNS
FTP
IGRP
How many types of Proxy Server? (Choose Three)
Transparent Proxy Server.
Reverse Proxy Server
Anonymous Server
Forward Proxy Server
Which of the followings are responsibilities for Presentation Layer? (Choose
Data Translation
Data Encryption
Data Framing
Physical Addressing
Data Compress
Which Layer 1 devices can be used to extend the area covered by a single
LAN segment? (Select two)
Switch
Router
NIC
HUB
Repeater
A brouter combines which functions? (Choose Two)
Router
Bridge
Gateway
Repeater
Which of following IP Addresses is Class B? (Choose Three)
168.28.42.1
192.168.1.1
129.100.24.1
172.24.254.1
Features of IPX include ___________________ (choose Three).
Connection-oriented
Very efficient

3.
4.
5.
Ques.18:
1.
2.
3.
4.
5.
Ques.19:
apply.)
1.
2.
3.
4.
5.
Ques.20:
1.
2.
3.
4.
5.
Ques.21:
1.
2.
3.
4.

No addressing problems
Excellent scaling without performance issues
None of The Above
Which of the following are characteristic of a peer-to-peer network?
Centralized security and administration.
A computer can be both a client and a server.
A limited number of computers are involved.
Does not require a hub.
None of The Above
SCSI connections can use which of the following connectors? (Choose all that
BNC
DB-25
Centronics-50
RJ-11
IBM Data Connector
Which of the following are characteristic of a true client/server environment?
Does not require a hub.
A computer can be both a client and a server.
Centralized security and administration.
Centralized backup.
None of The Above
A starting address of 192.0.0.0 and an ending address of 223.255.255.255 is
a member of which network class?
Class A
Class B
Class C
Class D

Single Choice
Ques.22:
1.
2.
3.
4.
5.
Ques.23:
1.
2.
3.
4.
5.
Ques.24:
1.
2.
3.
4.
5.

What is the maximum cable segment length of a 10BaseT network?


90 meters
100 meters
185 meters
300 meters
150 meters
Full form of CAN is:
City area Network
Campus Area Network
Connection Area Network
Conection -Less Area Network
None of the above
What is the maximum length for a segment of thinnet cabling?
185 meters
200 meters
250 meters
100 meters
18 meters

Ques.25:
1.
2.
3.

__________ is one of the most common network applications.


Sharing
Copying
Electronic mail or e-mail

4.
5.
Ques.26:
1.
2.
3.
4.
5.
Ques.27:
destination?
1.
2.
3.
4.
5.
Ques.28:
1.
2.
3.
4.
5.
Ques.29:
1.
2.
3.
4.
Ques.30:
1.
2.
3.
4.
5.
Ques.31:
1.
2.
3.
4.
Ques.32:
1.
2.
3.
4.
Ques.33:
1.
2.
3.
4.
5.

File Transfer Protocol


None of the above.
_____________ is the ideal solution for small networks
Internet
Server based
Intranet
Peer- to-Peer
None of the above.
Which of the following TPC/IP protocols is responsible for routing data to its
TCP
IP
ICMP
SMTP
None of The Above
When trouble shooting a wiring problem in your office, you find that all of the
computers attach to a single wire that snakes from computer to computer.
Which of the following wiring topologies does this describe?
Bus
Star
Ring
Mesh
None of The Above
Which of the following has the highest possible throughput?
STP
UTP
Coax
Fiber-optic
What is the media access control mechanism in which stations first determine
if another device is communicating on the wire and then resends its
information in the event of a collision known as?
CSMA/CD
Token Passing
CSMA/CA
Arcnet
None of The Above
Which of the following TCP/IP protocols is responsible for ensuring that
communication between hosts is reliable?
TCP
IP
ICMP
SMTP
The TCP/IP configuration parameter that defines which bits represent the
network portion of an address is known as the:
Default Gateway
IP address
Subnet mask
Network Identifier
A client/server approach uses what type of security model?
Centralized
Decentralized
Server
Distributed
None of The Above

Ques.34:
1.
2.
3.
4.
Ques.35:
exchange?
1.
2.
3.
4.
5.
Ques.36:
exchange?
1.
2.
3.
4.
5.
Ques.37:
1.
2.
3.
4.
Ques.38:
as what?
1.
2.
3.
4.
5.
Ques.39:
1.
2.
Ques.40:
1.
2.

The IP address 190.0.40.10 is in which class of addresses?


Class A
Class B
Class C
Class D
Which of the following OSI layers handles the function of formatting data for
Session
Transport
Application
Presentation
None of The Above
Which of the following OSI layers handles the function of formatting data for
Session
Transport
Application
Presentation
None of The Above
If IP does not have a route to the destination host for a packet, it will forward
the packet to the hosts:
Primary server
Default gateway
DNS server
WINS server
The TCP/IP protocol that resolves IP addresses into MAC addresses is known
TCP
IP
ARP
ICMP
None of the Above

True or False

200.4.8.255 is a valid IP Address?


TRUE
FALSE
IP protocol is routable?
TRUE
FALSE

Ques.41:
1.
2.
Ques.42:
1.
2.
Ques.43:
1.
2.
Ques.44:
VPNs.
1.
2.
Ques.45:
1.
2.
Ques.46:
1.
2.
Ques.47:
1.
2.
Ques.48:
1.
2.
Ques.49:
1.
2.
Ques.50:
1.
2.
Ques.51:

X.25 is an older transport protocol used in WANs?


TRUE
FALSE
Fiber Optic cable type has the best attenuation qualities?
TRUE
FALSE
ICF stands for Internet connection Firewall.
TRUE
FALSE
IPSec protocol is used to encrypt IP packets and most commonly Used in

TRUE
FALSE
HTTPS stands for Hyper Text Transport Protocol with SSL.
TRUE
FALSE
100BaseT is also known as Gigabit Ethernet.
TRUE
FALSE
DSL stands for Dynamic Subscriber Line.
TRUE
FALSE
Crossover cable is used for connecting to Different Devices like Hub and PC.
TRUE
FALSE
IMAP is alternative to POP3.
TRUE
FALSE
FTP stands for Folder Transfer Protocol.
TRUE
FALSE
A disturbance caused by electromagnetic interface along a circuit or a cable
pair is called as Crosstalk.
1.
TRUE
2.
FALSE
Ques.52:
CHAP stands for Challenge Handshake Authentication Protocol
1.
TRUE
2.
FALSE
Ques.53:
IFCONFIG is a command line utility for windows that displays current TCP/IP
setting of a PC.
1.
TRUE
2.
FALSE
Ques.54:
ISP stands for Internet Service Provider.
1.
TRUE
2.
FALSE
Ques.55:
In IP Version 6 is IP address is 128 bits.
1.
TRUE
2.
FALSE

Blanks Single Choice


Ques.56:
1.
2.
3.
4.
5.
Ques.57:
1.
2.
3.
4.
5.
Ques.58:
1.
2.
3.
4.
5.
Ques.59:
1.
2.
3.
4.
5.
Ques.60
1.
2.
3.
4.
5.

______ is a type of communication mode which is primarily used to supply a


peripheral with information, or to collect information from a peripheral?
Duplex
Full Duplex
Half Duplex
Simplex
None
Mac Address is of
42 Bytes Hex-Decimal
48 bits
48 Bytes Digital
12 Byte hexadecimal
32 Bytes Hex- Decimal
_________________ is Reliable Protocol
TCP
UDP
CDP
LDAP
CORBA
_________is a basic blueprint that describes the function of protocols for data
communications called?
ODI Model
OSI Model
OPI Model
ISI Model
Water-Fall Model
To connect Switch with other Switch use
Cross Cable
Straight Cable
Null Cable
Roll Cable
Can't Possible

ALL THE BEST

Potrebbero piacerti anche