Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
B. 128 bytes
C. 64 bits
D. 128 bits
Answer: Option D
2. What flavor of Network Address Translation can be used to have one IP address allow many
users to connect to the global Internet?
A. NAT
B. Static
C. Dynamic
D. PAT
Answer: Option D
3. What are the two main types of access control lists (ACLs)?
1. Standard
2. IEEE
3. Extended
4. Specialized
A. 1 and 3
B. 2 and 4
C. 3 and 4
D. 1 and 2
Answer: Option A
C. config mem
D. wr mem
Answer: Option B
5. You have 10 users plugged into a hub running 10Mbps half-duplex. There is a server connected
to the switch running 10Mbps half-duplex as well. How much bandwidth does each host have to
the server?
A. 100 kbps
B. 1 Mbps
C. 2 Mbps
D. 10 Mbps
Answer: Option D
B. B
C. G
D. N
Answer: Option C
7. Which of the following is the valid host range for the subnet on which the IP address
192.168.168.188 255.255.255.192 resides?
A. 192.168.168.129-190
B. 192.168.168.129-191
C. 192.168.168.128-190
D. 192.168.168.128-192
Answer: Option A
B. ISDN
C. HDLC
D. LCP
Answer: Option A
B. TCP
C. UDP
D. ARP
Answer: Option C
B. Physical layer
D. Application layer
Answer: Option B
12. Which class of IP address has the most host addresses available by default?
A. A
B. B
C. C
D. A and B
Answer: Option A
13. In a network with dozens of switches, how many root bridges would you have?
A. 1
B. 2
C. 5
D. 12
Answer: Option A
15. What is the main reason the OSI model was created?
A. To create a layered model larger than the DoD model.
B. ARP
C. ICMP
D. BootP
Answer: Option C
17. Communication between a computer and a keyboard involves ______________ transmission
a) Automatic
b) Half-duplex
c) Full-duplex
d) Simplex
Answer: d
18. Which organization has authority over interstate and international commerce in the
communications field?
a) ITU-T
b) IEEE
c) FCC
d) ISOC
Answer: c
a) PC
b) Smartphones
c) Servers
d) Switch
Answer: d
20. Three or more devices share a link in ________ connection
a) Unipoint
b) Multipoint
c) Point to point
Answer: b
21. When collection of various computers seems a single coherent system to its client, then it is called
a) computer network
b) distributed system
c) networking system
Answer: b
a) a process in one device is able to exchange information with a process in another device
23. Which one of the following computer network is built on the top of another network?
a) prior network
b) chief network
c) prime network
d) overlay network
Answer: d
Answer: d
a) broadcast network
b) unicast network
c) multicast network
Answer: a
27. A __________ is a device that forwards packets between networks by processing the routing
information included in the packet.
a) bridge
b) firewall
c) router
Answer: c
28. A list of protocols used by a system, one protocol per layer, is called
a) protocol architecture
b) protocol stack
c) protocol suite
Answer: b
29. Network congestion occurs
Answer: a
30. Which one of the following extends a private network across public networks?
Answer: b
a) DSL
b) FTTP
c) Cable
Answer: d
b) HFC
c) Optical cable
Answer: c
c) Shadow fading
d) Both The gauge of the twisted-pair line and Degree of electrical interfernece
Answer: d
a) Persistent
b) Non-persistent
Answer: a
36. The HTTP request message is sent in _________ part of three-way handshake.
a) First
b) Second
c) Third
d) Fourth
Answer: c
c) both device that allows wireless devices to connect to a wired network and wireless devices itself
Answer: a
39. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
a) CDMA
b) CSMA/CA
c) ALOHA
Answer: b
a) infrastructure mode
b) ad-hoc mode
Answer: c
b) all stations
Answer: a
Answer: b
44. What is internet?
a) a single network
Answer: b
b) internet society
Answer: c
46. Internet access by transmitting digital data over the wires of a local telephone network is provided
by
a) leased line
Answer: a
a) HTTP
b) DHCP
c) DNS
Answer: d
a) 32 bits
b) 64 bits
c) 128 bits
d) 265 bits
Answer: c
a) packet switching
b) circuit switching
Answer: a
51. Which one of the following is not an application layer protocol used in internet?
Answer: c
52. Which protocol assigns IP address to the client connected in the internet?
a) DHCP
b) IP
c) RPC
53. Which one of the following is not used in media access control?
a) ethernet
Answer: d
A: Modulus
B: Modem
C: Mod switch
D: Mod access
Answer B
55. Which of the following network device has the slowest type of connection?
A: DSL
B: Router
C: Bridges
D: Dial-up modems
Answer D
A: Bluetooth
B: WAN
C: WLAN
Answer:A
57. A place where there is a field of signal through which you can access WiFi internet is called –
A: WiFi Hotspots
B: WiFi Internet
C: WiFi Zone
D: WiFi Range
Answer:A
58. Which network is able to connect and send data to each computer via central hub or switch without
looking where the data is sent?
A: Star
B: Router
C: Bus
D: LAN
Answer:A
59. Which network is able to connect to each computer through a common central line?
A: Bus
B: Star
C: router
D: WAN
Answer:A
A: Star
B: Tree
C: Ring
D: LAN
Answer:C
B: Two
C: Three
D: Four
Answer:D
62. Which type of network is used for small geographical area such as in a one building?
A: WLAN
B: MAN
C: LAN
D: WAN
Answer:C
63. Which networking device connect one LAN to other LAN using same protocol?
A: Router
B: Switch
C: Bridge
D: Modem
Answer:B
64. Each IP packet must contain
Answer:C
A. Appliation layer
B. Transport layer
C. Network layer
D. Datalink layer
Answer:D
A. TCP
B. IP
C. UDP
Answer:A
67. Which layers of the OSI model are host-to-host layers?
Answer:A
A. Class A
B. Class B
C. Class C
D. Class D
Answer:D
Answer:A
70. The last address of IP address represents
A. Unicast address
B. Network address
C. Broadcast address
D. None of above
Answer:C
A. 64 bits
B. 48 bits
C. 32 bits
D. 16 bits
Answer:B
A. 4 layers
B. 5 layers
C. 6 layers
D. 7 layers
Answer:A
73. Which of the following layer of OSI model also called end-to-end layer?
A. Presentation layer
B. Network layer
C. Session layer
D. Transport layer
Answer:D
Answer: b
a) Client-server
b) P2P
Answer: a
a) 1
b) 2
c) 3
d) 4
Answer: b
Answer: c
80. If 5 files are transfered from server A to client B in the same session. The number of TCP connection
between A and B is
a) 5
b) 10
c) 2
d) 6
Answer: d
a) Mantains state
b) Is stateless
Answer: a
82. The commands, from client to server, and replies, from server to client, are sent across the control
a) 8
b) 7
c) 3
d) 5
Answer: b
Answer: d
84. Mode of data transfer in FTP, where all the is left to TCP
a) Stream mode
b) Block mode
c) Compressed mode
Answer: a
85. The password is sent to the server using _____ command
a) PASSWD
b) PASS
c) PASSWORD
Answer: b
a) Internet
b) Botnet
c) Telnet
d) D-net
Answer: b
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
Answer: d
88. The DoS attack is which the attacker establishes a large number of half-open or fully open TCP
connections
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
Answer: c
89. The DoS attack is which the attacker sends deluge of packets to the targeted host
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
Answer: b
a) Active receiver
b) Passive receiver
Answer: b
91. Sniffers can be deployed in
a) Wired environment
b) WiFi
c) Ethernet LAN
Answer: d
a) UDP traffic
b) TCP traffic
Answer: a
93. What is the minimum number of wires needed to send data over it serial communication link layer?
(A) 1
(B) 2
(C) 3
(D) 4
Answer . B
94. The interactive transmission of data within a time sharing system may be best suited to…..
Answer: B
Answer: D
(A) railway
(B) bank
(C) businessman
(D) transport
Answer: C
97. Which of the following techniques needs source device and destination device in line of sight for
data transfer?
(A) LAN
(B) Bluetooth
(C) WAN
(D) All
Answer: D
B. 5Gbps
C. 2.4GHz
D. 5GHz
Answer: Option D
99. What is the maximum distance running the lowest data rate for 802.11b?
A. About 100 feet
B. 5Gbps
C. 2.4GHz
D. 5GHz
Answer: Option C