set-1
1. ______ is not true in case of OSI and TCP/IP model.
2. A computer has just been installed on the Ethernet LAN but it is not communicating with the network, then what should be done at first?
3. Which of the following commands is not used in the troubleshooting of computer networks?
4. In network troubleshooting, which of the following commands is used?
5. Which server maintains a directory of domain names and translate them to Internet Protocol (IP) addresses.
6. Which data link sub-layer carries out data link functions that depend upon the type of medium?
7. When connected to the Internet, the device used to perform modulation and demodulation is called
8. An web-site is a collection of
9. In web applications, ______ is the correct order to form URLs.
10. In computer networking, MAN lies in between LAN and WAN in terms of
11. Which type of network is an Internet?
12. The most commonly used network media for small local area network is ______.
13. In computer networking, a Network Interface Card (NIC) has
14. Which statement is true in case of IP address?
15. Which of the following statement is false in case of IP
16. In computer networking, the commonly used topology for LAN is ______.
17. In network security, which statement is true in case of IPS?
18. In network security, which statement is false in case of IPS and IDS?
19. Which statement is false in case of peer-to-peer network?
20. In computer networking, most reliable network topology.
21. Which networking device can perform Network Address Translation (NAT)?
22. What is Data Encryption Standards (DES) used in network security?
23. Which of the following statement is true in case of IP address and MAC address?
24. What type of communication media is used to develop internet backbone for a bigger and wider Information Highway in the country?
25. In OSI reference mode, which layer takes care that the data is sent in such a way that the receiver will understand the data or information and will be able to use the data?
26. Which protocol is preferred for the streaming applications that require constant data flow, bulk data and fastness than reliability?
27. In HTTPS, the communication protocol is encrypted using......
28. A malware which attempts to obtain sensitive information for malicious reasons, by disguising as a trustworthy entity is called......
29. Which of the following malware do not reproduce or replicate itself but is still destructive?
30. A network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules is called
31. In computer networks, ______ is categorized in the computer related threats.
32. A universe of network-accessible information where web resources are identified by URLs and accessible via the Internet is called______.
33. In computer networking, ______ is not any network type.
34. A private enterprise network which is designed to support an organization’s employees to communicate, collaborate and perform their roles in a secure manner is called......
35. Which computer related threat attempts to obtain sensitive information by disguising as a trustworthy entity?
36. In network communication, which medium has the highest data transmission speed?
37. Which statement is false in case of Digital Signature?
38. In web applications, which security is applied in HTTPS?
39. In Nepal, the prevailing law which deals with the issues relating to cybercrime is......
40. In OSI reference mode, which layer takes care that the data is sent in such a way that the receiver will understand the data or information and will be able to use the data?
41. An ______ is a network security tool that continuously monitors a network for harmful activity and takes corrective action to block it.
42. Which of the following statements is false in case of Denial of Services (DoS) and Distributed Denial of Services (DDoS) attacks?
43. Which statement is false in case of Digital Signature?
44. ___ command can be used to check network connectivity between the host and the server/host when troubleshooting computer networks?
45. An ___ is a private network that provides controlled access to authorized customers, vendors, partners, or others outside the company.
46. A network in which two or more PCs are linked together to share files and get access to common devices like printers, scanners is called
47. Which of the following is not a network device?
48. A type of malicious code .which disguises itself as a desirable code or software but can take control of your computer is
49. A piece of code intentionally inserted into a software system that will cause malicious function when specified conditions are met is called
50. ___is not a valid subnet mask in computer networking.
Last updated