set-6
251. What is the main disadvantage of SSL?
SSL is too slow to be effective.
SSL is too complex to be used effectively.
SSL can cause network performance issues.
SSL can be bypassed by attackers.
252. What is ARP?
A routing protocol
A protocol used to map IP addresses to physical addresses
A protocol used to map physical addresses to IP addresses
None of these
253. What is RARP?
A protocol used to map IP addresses to physical addresses
A protocol used to map physical addresses to IP addresses
A routing protocol
None of these
254. What is IP?
A routing protocol
A protocol used to map IP addresses to physical addresses
A protocol used to map physical addresses to IP addresses
None of these
255. What is ICMP?
A routing protocol
A protocol used to map IP addresses to physical addresses
A protocol used to map physical addresses to IP addresses
A protocol used to manage network errors and status messages
256. What is the main advantage of ARP over other routing protocols?
ARP is faster than other routing protocols.
ARP is more secure than other routing protocols.
ARP is simpler to use than other routing protocols.
Other routing protocols are faster than ARP.
257. What is the port number for HTTP?
21
25
80
443
258. What is the port number for HTTPS?
21
25
80
443
259. What is the port number for FTP?
21
25
80
443
260. What is the port number for SMTP?
21
25
80
443
261. What is the port number for Telnet?
21
25
80
443
262. What is the subnet mask for the following IP address: 192.168.100.25/20?
255.255.0.0
255.255.240.0
255.255.255.0
255.255.255.240
263. What is the network address for the following IP address and subnet mask: 192.168.100.25/24?
192.168.100.0
192.168.100.1
192.168.100.24
192.168.100.25
264. What is the broadcast address for the following IP address and subnet mask: 192.168.100.25/22?
192.168.100.0
192.168.100.1
192.168.100.22
192.168.100.255
265. What does IPsec stand for?
Internet Protocol Security
Internet Protocol Secure
Internet Protocol Secured
Internet Protocol Securely
266. What is IPsec used for?
Encryption and authentication of IP packets
Encryption and authentication of TCP packets
Encryption and authentication of UDP packets
Encryption and authentication of all packets
267. What is a VPN used for?
Virtual Private Networking
Virtual Public Networking
Virtual Protected Networking
Virtual Private Network
268. What does VPN provide?
Secure and private communication over a public network
Secure and public communication over a private network
Insecure and private communication over a public network
Insecure and public communication over a private network
269. What does IEEE 802.3 stand for?
Institute of Electrical and Electronics Engineers 802.3
Institute of Electronics and Electrical Engineers 802.3
Institute of Electrical Engineers 802.3
Institute of Electronics Engineers 802.3
270. What is IEEE 802.3 known as?
Ethernet
Token Bus
Token Ring
CSMA/CD
271. What is the maximum data rate specified by the original IEEE 802.3 standard?
10 Mbps
100 Mbps
1000 Mbps
10 Gbps
272. What is the most common physical layer standard used by Ethernet networks?
10BaseT
100BaseT
1000BaseT
10000BaseT
273. What is a P2P network?
A centralized network where a single server handles all data transfers
A decentralized network where data transfers are handled by multiple nodes
A hierarchical network where data transfers are handled by a single node
A hybrid network where data transfers are handled by a combination of centralized and decentralized nodes
274. What are some examples of P2P applications?
BitTorrent, Gnutella, eDonkey
Skype, Google Drive, Dropbox
Amazon Web Services, Microsoft Azure, Google Cloud
HTTP, FTP, SMTP
275. What are the benefits of using P2P applications?
Decentralized data transfers, reduced server load, lower costs
Centralized data transfers, increased server load, higher costs
Hierarchical data transfers, increased server load, lower costs
Hybrid data transfers, balanced server load, moderate costs
276. What are the drawbacks of using P2P applications?
Security concerns, copyright infringement, slow data transfers
High data transfers, secure communication, no copyright infringement
Fast data transfers, secure communication, no copyright infringement
Secure data transfers, no copyright infringement, fast communication
277. What is E-mail?
Electronic Message
Electromagnetic Message
Electronic Mailbox
Electromagnetic Mailbox
278. What is the most common protocol used for E-mail transmission?
SMTP
FTP
HTTP
HTTPS
279. What is the most common format used for E-mail messages?
HTML
XML
Plain Text
Rich Text Format
280. What is the purpose of an E-mail client?
To manage and send E-mails.
To manage and receive E-mails.
To manage and store E-mails.
To manage, send, and receive E-mails
281. What is Multiplexing?
Combining multiple signals into a single signal.
Separating a single signal into multiple signals
Transmitting multiple signals simultaneously
Receiving multiple signals simultaneously
282. What is De-multiplexing?
Combining multiple signals into a single signal
Separating a single signal into multiple signals
Transmitting multiple signals simultaneously
Receiving multiple signals simultaneously
283. What is the purpose of Multiplexing in computer networking?
To reduce the number of communication channels required
To increase the number of communication channels required
To improve the quality of the communication channels
To reduce the speed of the communication channels
284. What is the purpose of De-multiplexing in computer networking?
To reduce the number of communication channels required
To increase the number of communication channels required
To improve the quality of the communication channels
To reduce the speed of the communication channels
285. Which layer 2 device is capable of filtering traffic based on the MAC addresses of the devices connected to it?
Hub
Switch
Router
Gateway
NIC
286. Which layer 3 device is capable of connecting two networks together and forwarding packets between them?
Hub
Switch
Router
Gateway
NIC
287. Which of the following devices operates at the network layer of the OSI model and is capable of connecting two different types of networks together?
Hub
Switch
Router
Gateway
Modem
288. Which layer of the OSI model is responsible for routing and switching packets between networks?
Application layer
Transport layer
Network layer
Data link layer
Physical layer
289. Which layer of the OSI model is responsible for providing error-free transmission of data?
Application layer
Transport layer
Network layer
Data-link layer
Physical layer
290. In which network topology are all devices connected to a central hub or switch?
Bus topology
Ring topology
Star topology
Mesh topology
291. In which network topology are devices connected in a circular chain?
Bus topology
Ring topology
Star topology
Mesh topology
292. In which network topology are all devices connected to a single cable?
Bus topology
Ring topology
Star topology
Mesh topology
293. In which network topology are devices connected to each other in a redundant manner to provide multiple paths for data to travel?
Bus topology
Ring topology
Star topology
Mesh topology
294. In which network topology are devices connected to a central backbone cable?
Bus topology
Ring topology
Star topology
Mesh topology
295. Which of the following routing protocols is used in small to medium-sized networks and is based on the hop count metric?
OSPF
BGP
EIGRP
RIP
296. Which of the following protocols is used to translate between IP addresses and MAC addresses in a network?
ARP
DNS
ICMP
SNMP
297. Which of the following protocols is used to provide secure communication over a network, especially over the internet?
SSL/TLS
IPSec
PPTP
L2TP
298. Which of the following network devices can inspect and filter traffic based on the content of the packets, and can be used to block malicious traffic?
Router
Firewall
Switch
Load balancer
299. Which of the following protocols is used to manage network devices and monitor network performance?
SNMP
SMTP
FTP
HTTP
300. Which of the following network topologies provides the highest level of fault tolerance and redundancy, with every device connected to every other device in the network?
Mesh topology
Bus topology
Star topology
Ring topology
301. Which of the following network topologies is used primarily in the airline industry for flight reservation systems?
Bus topology
Star topology
Mesh topology
Tree topology
302. Which of the following network topologies is used in Ethernet networks and can operate at high speeds?
Bus topology
Star topology
Mesh topology
Ring topology
303. Which of the following network topologies is used in token ring networks, where each device is connected to the next in a circular chain?
Bus topology
Star topology
Mesh topology
Ring topology
304. Which of the following network topologies is a combination of two or more different network topologies?
Hybrid topology
Star topology
Mesh topology
Ring topology
305. Which of the following network topologies is considered the most reliable due to its redundancy and fault tolerance?
Bus topology
Ring topology
Star topology
Mesh topology
Last updated