This document contains 27 multiple choice questions about networking concepts. The questions cover topics such as IP addressing, protocols, network devices, network topologies, and the OSI model. They assess understanding of fundamental networking principles including subnet masking, MAC addressing, routing, wireless standards, VLANs, and more.
A computer network or data network is a telecommunications network which allows computers to exchange data. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media.
A computer network or data network is a telecommunications network which allows computers to exchange data. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media.
Collections of CS Multiple Choice QuestionsShusil Baral
Here are the collections of sets of Multiple Choice Questions -MCQ of the different subjects related to Computer Science or Information Technology along with the answer of each question below the questions set. It may help for the preparation of your exams, tests or interviews.
Survey on Error Control Coding TechniquesIJTET Journal
Abstract - Error Control Coding techniques used to ensure that the information received is correct and has not been corrupted, owing to the environmental defects and noises occurring during transmission or the data read operation from Memory. Environmental interference and physical effects defects in the communication medium can cause random bit errors during data transmission. While, data corruption means that the detection and correction of bytes by applying modern coding techniques. Error control coding divided into automatic repeat request (ARQ) and forward error correction (FEC).First of all, In ARQ, when the receiver detects an error in the receiver; it requests back the sender to retransmit the data. Second, FEC deals with system of adding redundant data in a message and also it can be recovered by a receiver even when a number of errors were introduce either during the process of data transmission, or on the storage. Therefore, error detection and correction of burst errors can be obtained by Reed-Solomon code. Moreover, the Low-Density Parity Check code furnishes outstanding performance that sparingly near to the Shannon limit.
A XMLRPC Approach to the Management of Cloud Infrastructureiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Enhancing Cloud Computing Security for Data Sharing Within Group Membersiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Here you can find 1000's of Multiple Choice Questions(MCQs) of Computer Networks includes the MCQs of basic network theory with network definition, network models, connectivity and network addressing, introducton to OSI and TCP/IP network reference models, Layers of TCP/IP and OSI model with physical layer, data link layer, network layer, transport layer, session layer and application layer along with internet protocol, ICMP, ARP and Bootstrap protocol, types of routing protocol, Routing Information Protocol(RIP), Open Shortest Path First(OSPF), Border Gateway Protocol(BGP), User Datagram Protocol(UDP), File Transfer Protocol(FTP), Simple Mail Transfer Protocol(SMTP), Hyper Text Transfer Protocol(HTTP) and IPV6 addressing methods and also of Network security and Internet security.
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6IJERA Editor
This paper is focused on the Translator strategy for migration of IPv4 to Ipv6 implemented in Cisco packet
tracer. It describes the design and configuration of network devices and packet transfer between devices of IPv4
and IPv6 networks using NAT-PT as transition mechanism. First major version of IP, IPv4 is the dominant
protocol of internet.IPv6 is developed to deal with long anticipated problem of IPv4 running out of addresses.
The migration from IPv4 to IPv6 must be implemented node by node by using auto-configuration procedures to
eliminate the need to configure IPv6 hosts manually.
Computer security, also known as cybersecurity or IT security, refers to the security of computing devices such as computers and smartphones, as well as computer networks such as private and public networks, and the Internet.
Design and implementation of log domain decoder IJECEIAES
Low-Density-Parity-Check (LDPC) code has become famous in communications systems for error correction, as an advantage of the robust performance in correcting errors and the ability to meet all the requirements of the 5G system. However, the mot challenge faced researchers is the hardware implementation, because of higher complexity and long run-time. In this paper, an efficient and optimum design for log domain decoder has been implemented using Xilinx system generator with FPGA device Kintex7 (XC7K325T-2FFG900C). Results confirm that the proposed decoder gives a Bit Error Rate (BER) very closed to theory calculations which illustrate that this decoder is suitable for next generation demand which needs a high data rate with very low BER.
Performance comparison of transmitting jumbo frame on Windows and Linux SystemTELKOMNIKA JOURNAL
IPv6 is the successor of IPv4, the current Internet Protocol that runs out its address. It offers some improvements including simpler header format and extension header resulting in faster transmission of IP packets. However, IPv6 is a network layer protocol that requires lower layer services. IP packets from the network layer pass to data link layer to be encapsulated by layer 2 headers and trailer to become frames. Ethernet is the most widely used data link layer protocol in the current network devices. The technology is always improved to support high speed transmission. However, from standard Ethernet until ten gigabit Ethernet, the size of MTU remains unchanged at 1500 Bytes. This prevents the network from gaining an optimum performance on transmitting IP packets and operating systems cannot take full advantage of the high-speed performance of Gigabit Ethernet. This research aims to implement the transmission of IPv6 packets using jumbo frame on a test-bed environment. The implementation can be used to justify the impact of jumbo frame on the network as well as operating systems performance. The results prove that the OS used on implementation of jumbo frame affects on the network performance. The highest percentage of increasing throughput is 33.6% when both sender and receiver are running Windows. The decreasing delay by 54.36% was happened when using Linux in sender and Windows in receiver.
Collections of CS Multiple Choice QuestionsShusil Baral
Here are the collections of sets of Multiple Choice Questions -MCQ of the different subjects related to Computer Science or Information Technology along with the answer of each question below the questions set. It may help for the preparation of your exams, tests or interviews.
Survey on Error Control Coding TechniquesIJTET Journal
Abstract - Error Control Coding techniques used to ensure that the information received is correct and has not been corrupted, owing to the environmental defects and noises occurring during transmission or the data read operation from Memory. Environmental interference and physical effects defects in the communication medium can cause random bit errors during data transmission. While, data corruption means that the detection and correction of bytes by applying modern coding techniques. Error control coding divided into automatic repeat request (ARQ) and forward error correction (FEC).First of all, In ARQ, when the receiver detects an error in the receiver; it requests back the sender to retransmit the data. Second, FEC deals with system of adding redundant data in a message and also it can be recovered by a receiver even when a number of errors were introduce either during the process of data transmission, or on the storage. Therefore, error detection and correction of burst errors can be obtained by Reed-Solomon code. Moreover, the Low-Density Parity Check code furnishes outstanding performance that sparingly near to the Shannon limit.
A XMLRPC Approach to the Management of Cloud Infrastructureiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Enhancing Cloud Computing Security for Data Sharing Within Group Membersiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Here you can find 1000's of Multiple Choice Questions(MCQs) of Computer Networks includes the MCQs of basic network theory with network definition, network models, connectivity and network addressing, introducton to OSI and TCP/IP network reference models, Layers of TCP/IP and OSI model with physical layer, data link layer, network layer, transport layer, session layer and application layer along with internet protocol, ICMP, ARP and Bootstrap protocol, types of routing protocol, Routing Information Protocol(RIP), Open Shortest Path First(OSPF), Border Gateway Protocol(BGP), User Datagram Protocol(UDP), File Transfer Protocol(FTP), Simple Mail Transfer Protocol(SMTP), Hyper Text Transfer Protocol(HTTP) and IPV6 addressing methods and also of Network security and Internet security.
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6IJERA Editor
This paper is focused on the Translator strategy for migration of IPv4 to Ipv6 implemented in Cisco packet
tracer. It describes the design and configuration of network devices and packet transfer between devices of IPv4
and IPv6 networks using NAT-PT as transition mechanism. First major version of IP, IPv4 is the dominant
protocol of internet.IPv6 is developed to deal with long anticipated problem of IPv4 running out of addresses.
The migration from IPv4 to IPv6 must be implemented node by node by using auto-configuration procedures to
eliminate the need to configure IPv6 hosts manually.
Computer security, also known as cybersecurity or IT security, refers to the security of computing devices such as computers and smartphones, as well as computer networks such as private and public networks, and the Internet.
Design and implementation of log domain decoder IJECEIAES
Low-Density-Parity-Check (LDPC) code has become famous in communications systems for error correction, as an advantage of the robust performance in correcting errors and the ability to meet all the requirements of the 5G system. However, the mot challenge faced researchers is the hardware implementation, because of higher complexity and long run-time. In this paper, an efficient and optimum design for log domain decoder has been implemented using Xilinx system generator with FPGA device Kintex7 (XC7K325T-2FFG900C). Results confirm that the proposed decoder gives a Bit Error Rate (BER) very closed to theory calculations which illustrate that this decoder is suitable for next generation demand which needs a high data rate with very low BER.
Performance comparison of transmitting jumbo frame on Windows and Linux SystemTELKOMNIKA JOURNAL
IPv6 is the successor of IPv4, the current Internet Protocol that runs out its address. It offers some improvements including simpler header format and extension header resulting in faster transmission of IP packets. However, IPv6 is a network layer protocol that requires lower layer services. IP packets from the network layer pass to data link layer to be encapsulated by layer 2 headers and trailer to become frames. Ethernet is the most widely used data link layer protocol in the current network devices. The technology is always improved to support high speed transmission. However, from standard Ethernet until ten gigabit Ethernet, the size of MTU remains unchanged at 1500 Bytes. This prevents the network from gaining an optimum performance on transmitting IP packets and operating systems cannot take full advantage of the high-speed performance of Gigabit Ethernet. This research aims to implement the transmission of IPv6 packets using jumbo frame on a test-bed environment. The implementation can be used to justify the impact of jumbo frame on the network as well as operating systems performance. The results prove that the OS used on implementation of jumbo frame affects on the network performance. The highest percentage of increasing throughput is 33.6% when both sender and receiver are running Windows. The decreasing delay by 54.36% was happened when using Linux in sender and Windows in receiver.
1- Which layer of the OSI model defines how to start- control- and end.pdfStevenLCvWalkera
1. Which layer of the OSI model defines how to start, control, and end conversations by
grouping messages in a workflow?
A)Application layer
B)Presentation layer
C)Session layer
D)Transport layer
E)Network layer
F)Data link layer
G)Physical layer
2. Which of the following terms best describes the process of adding headers and possibly
trailers to information for transit?
A)Frames B) Encapsulation C) Packets D) Data Linking
3.Which of the OSI model layers has the main purpose of defining and negotiating data
formatting?
A)Data link
B)Application
C)Transport
D)Presentation
E)Network
4.In IT, what term refers to a small network that is used for business purposes, typically in the
home of a business or employee?
A)Enterprise network
B)IT network
C)Cloud network
D)SOHO network
E)Organizational network
5.Which layer of the TCP/IP model defines the rules for data packet recovery?
A)Application B) Transport C) Internet D) Data link
6.An Ethernet address is also commonly referred to as a address.
A)Unicast B) MAC C) Host D) IP E)Cam
7.On a LAN RJ-45 connector, what name is given to the eight physical connections that make
contact when connected?
A)Threads B) Strands C) Crimps D) Wires E) Pins
8.Which IEEE standard defines the use of radio waves to communicate between wireless LAN
nodes?
A)IEEE 802.11
B)IEEE 802.16
C)IEEE 802.3
D)IEEE 802.2
E)IEEE 802.5
9.When a collision occurs on a shared Ethernet network, what is the first step in recovery for the
two computers in question?
A)Send a jamming signal. B) Wait for the other computer to finish.
C) Do nothing until the line clears. D) Resend the last frame right away.
10.When connecting a wire to a host FastEthernet interface, which pins are used for
communications?
A)Pins 3 and 6 to receive B) Pins 1 and 2 for receive
C) Pins 1 and 2 to receive D) Pins 3 and 6 to transmit
E) Pins 1 and 2 to transmit F) Pins 7 and 8 for transmit
11.When connecting a router to an external CSU/DSU, which serial cable type is typically used?
A)RTS B) DTE C) DCE D) CTS E) DE
12.What is the name of the device that is typically located within a telephone company's central
office (CO) and enables it to utilize existing telephone wiring for both normal telephone services
and DSL?
A)CMTS
B)DSLAM
C)DSL modem
D)Class 5 switch
E)Telephone concentrator
13.Which HDLC field is equivalent to the preamble in Ethernet?
A)Address B) FCS C) Flag D) Control
14.Which of the following is the correct term describing the middle of the Internet, owned by
various Internet service providers and consisting of a complex network of networks?
A)WAN B) Internet access link
C) Internet core D) LAN
15.Which of the following fields in HDLC does not exist in Ethernet and is typically considered
outmoded for modern links between routers?
A)Address B) Flag C) FCS D) Control
16)What command can be used on most modern PC operating systems to display the contents of
the ARP cache from the CLI?
A)ifconfig B) netstat - a C) arpname D) arp - a
17.Which layer of the .
1) What is the difference between CSMACD and CSMACA2) Which .docxdorishigh
1) What is the difference between CSMA/CD and CSMA/CA
2) Which of the following is a form of Ethernet that is transmitted over Fiber Optics
3) You’re setting up a network at an engineering office where very large files are going to move back and forth over the network all day long, day in and day out. Which of the following devices is more likely to avoid a lot of network congestion?
4) A router operates at the ____________ layer of the OSI model.
5) Which of the OSI layers interprets an IP address?
6) How does Exponential backoff work.
7) A collision on an Ethernet network occurs when ______________.
8) In the above illustrated IP address, if this were a Class B address, which of the four octets would be part of the network address?
9) Describe how CSMA/CD works.
10) RIP is a form of _______________ protocol.
11) You have a Class C TCP/IP network. You are using the default subnet mask. What is the maximum number of hosts you can have on your network?
12) Which Networking hardware protocol utilizes CSMA/CD media access methods?
1) FDDI uses a ___________ topology
2) 15.46.86.101 is a ________________ IP address.
3) What is the difference between RTZ and AMI signaling.
4) Which network topology requires that a terminator be installed at both ends of the network?
1) IPX/SPX uses a ____________ -bit network address.
2) The proper default subnet mask for a Class A network is 255.255.0.0.
1) Why is CRC a better error detection method than checksum
2) Which of the following is NOT something DHCP can automaticall configure.
3) The HTTP protocol uses port 80 on a typical Windows machine
4) TCP/IP Version 6 uses a _____________ -bit address.
5) Which of the following OSI layers breaks the user data down into smaller chunks for transmission onto the network?
1) The protocol that is used for outgoing email messages is usually _____________.
...
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Introduction to AI for Nonprofits with Tapp Network
Network (FE)
1. Network (FE)
by Tanat Tonguthaisri
itpe@nstda.or.th
2. 1. When the subnet mask “255.255.255.0” is
used in a “class A” network, how many host
addresses can be assigned to network devices?
a) 254
b) 256
c) 2 16
d) 2 24
3. 2. Which of the following protocols is used in mail
servers on a TCP/IP network?
a) DHCP
b) SMTP
c) SNMP
d) TELNET
4. 3. Which of the following protocols is supported
by the transport layer of the OSI basic reference
model?
a) HTTP
b) IP
c) PPP
d) TCP
5. 4. Which of the following is the network topology
that is used to connect one central node or hub
with point-to-point links to several other nodes?
a) Bus
b) Mesh
c) Ring
d) Star
6. 5. In home and office networks of Fast or Gigabit
Ethernet, which of the following cables can be
used as a lower cost option for connecting a
client PC to the network?
a) Coax
b) Fiber-optic
c) STP
d) UTP
7. 6. Which of the following is a device that
interconnects LANs at the physical layer of the
OSI basic reference model?
a) Bridge
b) Gateway
c) Repeater
d) Router
8. 7. Which of the following is the most appropriate
information used by routers in order to determine
the routing paths of packets?
a) Destination IP address
b) Destination MAC address
c) Source IP address
d) Source MAC address
9. 8. Which of the following appropriately explains
the function of the transport layer in the OSI
basic reference model?
a) It is responsible for establishing, managing, and terminating
communication connections between the applications running in
different nodes, and provides means for dialogue control
between end systems.
b) It is responsible for maintaining reliable end-to-end
communications and data transfer between systems across the
network, and provides a variety of functions including flow
control, virtual circuit, and error checking and recovery.
c) It provides a set of interfaces for applications to obtain access
to networked services as well as access to a variety of network
services that support applications directly.
d) It provides a variety of coding and conversion functions which
ensure that information sent from the application layer of one
system is readable by that of another system.
10. 9. Which of the following is the appropriate statement
concerning the number of host addresses available to
one sub-network in IPv4?
a) The number of host addresses available in a sub-
network is always fixed, depending on the class of IP
address; 28 for class A, 216 for class B, and 224 for class C.
b) The number of host addresses available in a sub-
network is always fixed, depending on the class of IP
address; 224 for class A, 216 for class B, and 28 for class
C.
c) The number of host addresses available in a sub-
network is determined by the number of “0” bits in the
subnet mask.
d) The number of host addresses available in a sub-
network is determined by the number of “1” bits in the
subnet mask.
11. 10. Which of the following is the local broadcast
address to be used by a computer with IP
address 202.130.17.63 and subnet mask
255.255.255.0 if classless addressing is used?
a) 202.130.0.0
b) 202.130.0.1
c) 202.130.17.1
d) 202.130.17.255
12. 11. When a 9-Kbyte data file is transmitted using the asynchronous
(or start-stop) communication protocol at a speed of 2,400 bps, what
is the “overhead” (time spent on sending start, stop, and parity bits
except data bits) in seconds? Here, a start bit is first sent, followed
by eight data bits, no parity bit, and one stop bit, for each byte of the
data file.
a) 7.5
b) 11.25
c)30
d)37.5
13. 9 K-byte
Start bit + stop bit = 2 bit per byte.
9K x 2 = 18 K-bits for this file.
18 Kbits / 2400 bps = 7.5 seconds.
14. 12. When MAC (Media Access Control) frames
defined by IEEE 802.3 are transmitted over
Ethernet, which of the following methods is used
for error detection?
a) Checksum
b) CRC
c)Hamming code check
d)Parity check
15. 13. Which of the following methods is used for
avoiding unnecessary collisions in the IEEE
802.11 family of wireless LAN standards?
a) CDMA
b) CSMA/CA
c)CSMA/CD
d)TDMA
16. 14. VLAN (Virtual LAN) is used to logically
segment a LAN into different broadcast domains.
In which of the following network devices should
the function of VLAN be supported?
a) Bridge
b) Hub
c)Repeater
d)Switch
17. 15. Which of the following protocols can be used
to temporarily assign an IP address leased from
the pool to the host that asks for an address or to
repeatedly assign the same IP address to the
host according to the MAC address of the host?
a) ARP
b) DHCP
c)SIP
d)SNMP
18. 16. Which of the following can be used to
interconnect multiple LANs on the network layer
(layer 3) of the OSI basic reference model and to
relay packets of data?
a) Bridge
b) Gateway
c)Repeater
d)Router
19. 17. When the subnet mask 255.255.255.240 is
used for a server, which of the following is a valid
IP address of the server?
a) 193.144.134.31
b) 194.123.178.16
c)195.206.108.25
d)196.168.206.47
21. 18. Which of the following is the signaling
protocol that is widely used to initiate, manage,
and terminate multimedia communication
sessions, such as voice and video calls over the
Internet?
a) RTP
b) SIP
c)SMTP
d)SNMP
22. 19. Which of the following is a security feature
that can allow network administrators to specify
exactly which stations should have access to the
wireless network?
a) IP address filtering
b) MAC address
filtering
c)Packet filtering
d)URL filtering
23. 20. Which of the following information in IP
header is used for routing the IP packets
across networks?
a) Destination address and source
address fields
b) Destination address field
c) Destination address, source address,
and protocol fields
d) Source address field
24. 21. Which of the following network
topologies is commonly used, especially in
Fast or Gigabit Ethernet, for connecting
network devices via a centralized unit such
as a hub or a switch?
a) Bus
b) Mesh
c) Ring
d) Star
25. 22. What is the minimum number of
communication cables that are needed to connect
six network devices in a full mesh topology? Here,
at least one communication cable is required to
connect two network devices.
a) 5
b) 6
c) 12
d) 15
27. 23. Which of the following is the IP network
addressing and routing scheme whereby data is
routed to the “nearest” or “best” destination as
viewed by the routing topology?
a) Anycast
b) Multicast
c) Singlecast
d) Unicast
28. 24. Which of the following protocols can be used to access e-
mail messages that are stored on a remote, and possibly
shared, mail server, and thereby are manipulated from a
desktop computer at home, a workstation at the office, and a
notebook computer while traveling, without the need to
transfer messages back and forth between these computers?
a) FTP
b) IMAP
c) POP3
d) SMTP
29. 25. Which of the following is an appropriate
explanation concerning the function of a
proxy server?
a) It is a centralized point of access to the Internet, and also provides an
effective and efficient way to improve network performance by memory and
disk caching of commonly visited web sites.
b) It is used for translating, or resolving, domain names into IP addresses.
Every time a domain name is entered, it resolves that name to the
appropriate IP address and allows communication across the Internet.
c) It provides a simple and secure way to upload and download information,
either text or graphics, between the server and clients over the Internet.
d) It provides a way to manage and automate the assignment of IP addresses
from a central point, and sends a new IP address and other network
configuration information automatically when a client is plugged into the
Internet.
30. 26. In the OSI basic reference model, which of the following
is the appropriate layer that provides end-to-end
communication services for applications, and also provides
convenient services such as connection-oriented or
connectionless data stream support, reliability, flow control,
and congestion control?
a) Data link layer
b) Network layer
c) Session layer
d) Transport layer
31. 27. Which of the following is an appropriate
combination of the protocols that are used for
transmitting and receiving e-mail as shown in the
diagram below? (3) Transfer e-mail
Mail server Mail server
(1) Send e-mail (2) Receive e-mail
Mail client
(1) (2) (3)
a) POP3 POP3 SMTP
b) POP3 SMTP POP3
c) SMTP POP3 SMTP
d) SMTP SMTP SMTP
32. 28. Which of the following describes the role
of DNS in the TCP/IP network?
a) Allocating an unused IP address from the IP
addresses registered in the server, in response to a
request from a PC for IP address assignment
b) Enabling access to the Internet by converting an in-
company private IP address into a global IP address
c) Linking a name, such as a domain name or a host
name, with an IP address
d) Making it possible to call a program in a server by
specifying its name without regard to the IP address
of the server
33. 29. When the CRC (Cyclic Redundancy
Check) function is implemented by
calculating a generator polynomial, which of
the following is used as a CRC code
(sometimes simply called CRC)?
a) Dividend
b) Quotient
c) Remainder
d) Summation
34. 30. Which of the following is the broadcast MAC
address that is used by multiple protocols, such as
ARP (Address Resolution Protocol) and RIP
(Routing Information Protocol), in order to transmit
data to all of the hosts on the local subnet?
a) 00-00-00-00-00-00
b) EE-FF-EE-FF-EE-
FF
c) F0-F0-F0-F0-F0-F0
35. 31. In an IPv4 environment, when the subnet
mask “255.255.255.224” is used for a class C
network, how many IP addresses including
reserved or ineffective addresses can be
assigned to subnets and hosts per subnet
respectively?
Number of IP addresses
Subnet Host
a) 8 32
b) 16 16
c) 16 32
d) 32 8
37. 32. Which of the following is the appropriate layer
of the OSI basic reference model that provides
RPC (Remote Procedure Call) support, maintains
the integrity of the connection between nodes, and
controls data exchange?
a) Application layer
b) Network layer
c) Presentation layer
d) Session layer
38. 33. Which of the following is a connectionless
protocol that offers speed and low overhead as its
primary advantage in the transport layer of the OSI
basic reference model?
a) ARP
b) ICMP
c) IP
d) UDP
39. 34. Which of the following is a protocol used by the
ping command in order to verify that the
communication link between source and
destination is working in the TCP/IP network
environment?
a) ARP
b) ICMP
c) SMTP
d) SNMP
40. 35. Which of the following is an appropriate
combination of information that a DHCP server
dynamically provides for a client host to
participate in the TCP/IP network?
a) IP address, MAC address, default gateway
address, and DNS server address
b) IP address, MAC address, DNS server address,
and routing information
c) IP address, subnet mask, default gateway
address, and DNS server address
d) IP address, subnet mask, default gateway
address, and routing information
41. 36. Which of the following is the appropriate
combination that is defined as a socket address in
TCP/IP network environments?
a) IP address and port number
b) IP address and socket number
c) MAC address and port number
d) MAC address and socket number
42. 37. Which of the following is the server that can be
used to intercept all messages entering and
leaving the network and to effectively hide the true
network addresses?
a) DHCP server
b) DNS server
c) E-mail server
d) Proxy server
43. 38. Which of the following is the data transmission technique that has
features or characteristics shown below?
It is designed for cost-efficient data transmission for
intermittent traffic between LANs and between end-points
in a WAN.
Data is transmitted in a variable-size unit.
Error correction (i.e., retransmission of data) is left up to
the end-points.
It is based on the X.25 protocol, but it is faster because of
a simplified X.25 protocol with minimal services.
It provides a mid-range service between ISDN and ATM.
a) Cell relay
b) Frame relay
c) Message Switching
d) Packet Switching
44. 39. In the network shown below, the STP (Spanning Tree Protocol) is
used on both S1 and S2 switches. When the link between two PCs A
and C is established via L1, which of the following is the appropriate
link that is used to transfer data between two PCs B and D?
A B
S1
L1 L2 L3
S2 a) Always L1
b) Always L2
C D
c) Always L3
d) Either L2 or L3
45. 40. In a URL (Uniform Resource Locator) specified to
access a Web page through the Internet, which of the
following is the appropriate sequence of four basic parts:
the name of the Web page, directory and/or subdirectory
which holds the Web page, access protocol, and host
name?
a) host name, protocol, directory, page
b) host name, protocol, page, directory
c) protocol, host name, directory, page
d) protocol, page, directory, host name
46. 41. Which of the following is used for encoding and
interpreting binary files, images, video, and non-
ASCII character sets within an e-mail message on
the Internet?
a) IMAP
b) MIME
c) POP3
d) SMTP