set-1

1. ______ is not true in case of OSI and TCP/IP model.

  1. The OSI Model is a logical and conceptual model that defines how communication needs to be done

  2. TCP/IP model depends on standard protocols that assigns the network of hosts over the Internet.

  3. Both OSI and TCP/IP models are protocol independent

  4. None of these

Show me the answer

Answer: 3. Both OSI and TCP/IP models are protocol independent

Explanation:

  • The OSI model is a conceptual framework, while the TCP/IP model is based on standard protocols. The OSI model is protocol-independent, but the TCP/IP model is protocol-dependent.

2. A computer has just been installed on the Ethernet LAN but it is not communicating with the network, then what should be done at first?

  1. Update the NIC driver

  2. Verify the IP address configuration on the workstation

  3. Verify the connectivity on the computer’s network card

  4. All of the above

Show me the answer

Answer: 2. Verify the IP address configuration on the workstation

Explanation:

  • The first step in troubleshooting network connectivity issues is to verify the IP address configuration, as incorrect settings can prevent communication.

3. Which of the following commands is not used in the troubleshooting of computer networks?

  1. Ping

  2. Tracert

  3. Ipconfig

  4. Chkdsk

Show me the answer

Answer: 4. Chkdsk

Explanation:

  • Chkdsk is a command used to check the file system and disk for errors, not for network troubleshooting.

4. In network troubleshooting, which of the following commands is used?

  1. Netstat

  2. Nslookup

  3. Tracert

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Netstat, Nslookup, and Tracert are all commonly used commands for network troubleshooting.

5. Which server maintains a directory of domain names and translate them to Internet Protocol (IP) addresses.

  1. DNS Server

  2. DHCP Server

  3. Web Server

  4. Database Server

Show me the answer

Answer: 1. DNS Server

Explanation:

  • The DNS (Domain Name System) server is responsible for translating domain names into IP addresses.

  1. Logical link control

  2. Media access control

  3. Network interface control

  4. Error Control

Show me the answer

Answer: 2. Media access control

Explanation:

  • The Media Access Control (MAC) sub-layer is responsible for controlling access to the physical medium.

7. When connected to the Internet, the device used to perform modulation and demodulation is called

  1. Trans receiver

  2. Modem

  3. Repeater

  4. All of the above

Show me the answer

Answer: 2. Modem

Explanation:

  • A modem (modulator-demodulator) is used to convert digital data to analog signals for transmission over telephone lines and vice versa.

8. An web-site is a collection of

  1. Components of internet

  2. Web-pages

  3. Web links

  4. All of the above

Show me the answer

Answer: 2. Web-pages

Explanation:

  • A website is a collection of web pages that are linked together and hosted on a web server.

9. In web applications, ______ is the correct order to form URLs.

  1. Protocol name, File name, DNS name

  2. DNS name, Protocol name, File name

  3. Protocol name, DNS name, File name

  4. Protocol name, File name, DNS name

Show me the answer

Answer: 3. Protocol name, DNS name, File name

Explanation:

  • The correct order for forming URLs is Protocol name (e.g., http), DNS name (e.g., www.example.com), and File name (e.g., index.html).

10. In computer networking, MAN lies in between LAN and WAN in terms of

  1. Area coverage

  2. Data transfer rate

  3. Both of the above

  4. None of these

Show me the answer

Answer: 3. Both of the above

Explanation:

  • A Metropolitan Area Network (MAN) covers a larger area than a Local Area Network (LAN) but smaller than a Wide Area Network (WAN), and it typically offers higher data transfer rates than a WAN.

11. Which type of network is an Internet?

  1. LAN

  2. MAN

  3. WAN

  4. All of the above

Show me the answer

Answer: 3. WAN

Explanation:

  • The Internet is a global network, which falls under the category of a Wide Area Network (WAN).

12. The most commonly used network media for small local area network is ______.

  1. Twisted pair cable

  2. Co-axial cable

  3. Optical fiber

  4. All of the above

Show me the answer

Answer: 1. Twisted pair cable

Explanation:

  • Twisted pair cables are widely used in small local area networks (LANs) due to their cost-effectiveness and ease of installation.

13. In computer networking, a Network Interface Card (NIC) has

  1. MAC address

  2. IP address

  3. Subnet mask

  4. All of the above

Show me the answer

Answer: 1. MAC address

Explanation:

  • A Network Interface Card (NIC) has a unique MAC (Media Access Control) address, which is used for identification on the network.

14. Which statement is true in case of IP address?

  1. Every computer connected to the network must have an IP address to communicate.

  2. Every computer connected to the Internet must have an IP address to communicate.

  3. Both of the above

  4. None of these

Show me the answer

Answer: 3. Both of the above

Explanation:

  • An IP address is required for any device to communicate on a network or the Internet.

15. Which of the following statement is false in case of IP

  1. IP is an Internet path

  2. Every computer must have an IP address

  3. IP is a unique address of a computer connected to the network

  4. Both A and B

Show me the answer

Answer: 4. Both A and B

Explanation:

  • IP is not an "Internet path"; it is a unique address assigned to devices for communication. Not every computer must have an IP address if it is not connected to a network.

16. In computer networking, the commonly used topology for LAN is ______.

  1. Star topology

  2. Ring topology

  3. Bus topology

  4. Tree topology

Show me the answer

Answer: 1. Star topology

Explanation:

  • The star topology is the most commonly used topology in LANs because it is easy to set up and manage.

17. In network security, which statement is true in case of IPS?

  1. IPS is a network security technology that examines network traffic flows to detect and prevent vulnerability exploits.

  2. If an attack is detected, IPS can stop the malicious traffic before it makes it to rest of the network.

  3. Both of the above

  4. None of these

Show me the answer

Answer: 3. Both of the above

Explanation:

  • An Intrusion Prevention System (IPS) monitors network traffic for malicious activity and can take action to block or prevent attacks.

18. In network security, which statement is false in case of IPS and IDS?

  1. IDS is a device or software application that monitors a network or systems for malicious activity or policy violations.

  2. IPS controls access to IT networks in order to protect systems from attack and abuse.

  3. IDS are designed to identify suspicious attacks and to take the corrective action to block them.

  4. If an attack is detected, IPS can stop the malicious traffic before it makes it to rest of the network.

Show me the answer

Answer: 3. IDS are designed to identify suspicious attacks and to take the corrective action to block them.

Explanation:

  • IDS (Intrusion Detection System) only detects and alerts about suspicious activity, while IPS (Intrusion Prevention System) can take action to block attacks.

19. Which statement is false in case of peer-to-peer network?

  1. In peer-to-peer networks all nodes are act as server as well as client.

  2. Peer-to-peer network is easier to setup.

  3. Peer-to-peer network is more expensive than client server network.

  4. Each workstation on the network shares its files equally with the others.

Show me the answer

Answer: 3. Peer-to-peer network is more expensive than client server network.

Explanation:

  • Peer-to-peer networks are generally less expensive to set up and maintain compared to client-server networks.

20. In computer networking, most reliable network topology.

  1. Bus topology

  2. Mesh topology

  3. Tree topology

  4. None of these

Show me the answer

Answer: 2. Mesh topology

Explanation:

  • Mesh topology is the most reliable because it provides multiple paths for data transmission, ensuring redundancy.

21. Which networking device can perform Network Address Translation (NAT)?

  1. Bridge

  2. Switch

  3. Router

  4. All of the above

Show me the answer

Answer: 3. Router

Explanation:

  • Routers are capable of performing Network Address Translation (NAT), which allows multiple devices on a local network to share a single public IP address.

22. What is Data Encryption Standards (DES) used in network security?

  1. It is symmetric key cryptography

  2. It uses only one key for encryption and decryption

  3. It is asymmetric key cryptography

  4. Both A and B

Show me the answer

Answer: 4. Both A and B

Explanation:

  • DES is a symmetric key cryptography algorithm, meaning it uses the same key for both encryption and decryption.

23. Which of the following statement is true in case of IP address and MAC address?

  1. Every network device must have IP address and MAC address to communicate.

  2. IP address is logical address and MAC address is physical address.

  3. IP address can be changed but MAC address can never be changed.

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • IP addresses are logical and can be changed, while MAC addresses are physical and generally fixed.

24. What type of communication media is used to develop internet backbone for a bigger and wider Information Highway in the country?

  1. Wireless microwave link

  2. Co-axial cable

  3. Optical fiber

  4. All of the above

Show me the answer

Answer: 3. Optical fiber

Explanation:

  • Optical fiber is widely used for internet backbones due to its high bandwidth and long-distance capabilities.

25. In OSI reference mode, which layer takes care that the data is sent in such a way that the receiver will understand the data or information and will be able to use the data?

  1. Transport layer

  2. Session layer

  3. Presentation layer

  4. Application layer

Show me the answer

Answer: 3. Presentation layer

Explanation:

  • The Presentation layer is responsible for translating data into a format that the application layer can understand.

26. Which protocol is preferred for the streaming applications that require constant data flow, bulk data and fastness than reliability?

  1. TCP

  2. UDP

  3. FTP

  4. ARP

Show me the answer

Answer: 2. UDP

Explanation:

  • UDP (User Datagram Protocol) is preferred for streaming applications because it provides faster data transmission without the overhead of error checking and retransmission.

27. In HTTPS, the communication protocol is encrypted using......

  1. Application layer security

  2. Transport layer security

  3. Network layer security

  4. None of these

Show me the answer

Answer: 2. Transport layer security

Explanation:

  • HTTPS uses SSL/TLS (Secure Sockets Layer/Transport Layer Security) to encrypt communication at the transport layer.

28. A malware which attempts to obtain sensitive information for malicious reasons, by disguising as a trustworthy entity is called......

  1. Trojan horse

  2. Phishing

  3. Logic bomb

  4. All of the above

Show me the answer

Answer: 2. Phishing

Explanation:

  • Phishing is a type of malware attack where attackers disguise themselves as trustworthy entities to steal sensitive information.

29. Which of the following malware do not reproduce or replicate itself but is still destructive?

  1. Virus

  2. Trojan

  3. Worm

  4. Both B and C

Show me the answer

Answer: 2. Trojan

Explanation:

  • A Trojan does not replicate itself but can still cause significant damage by providing unauthorized access to a system.

30. A network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules is called

  1. Router

  2. Switch

  3. Firewall

  4. None of these

Show me the answer

Answer: 3. Firewall

Explanation:

  • A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predefined security rules.

  1. Phishing

  2. Spyware

  3. Trojan horse

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Phishing, spyware, and Trojan horses are all types of computer-related threats.

32. A universe of network-accessible information where web resources are identified by URLs and accessible via the Internet is called______.

  1. Local Area Network (LAN)

  2. Wide Area Network (WAN)

  3. World Wide Web (WWW)

  4. Storage Area Network (SAN)

Show me the answer

Answer: 3. World Wide Web (WWW)

Explanation:

  • The World Wide Web (WWW) is a system of interlinked hypertext documents accessed via the Internet.

33. In computer networking, ______ is not any network type.

  1. Metropolitan Area Network

  2. Public Area Network

  3. Wireless Local Area Network

  4. Personal Area Network

Show me the answer

Answer: 2. Public Area Network

Explanation:

  • "Public Area Network" is not a recognized network type.

34. A private enterprise network which is designed to support an organization’s employees to communicate, collaborate and perform their roles in a secure manner is called......

  1. Email

  2. Internet

  3. Extranet

  4. Intranet

Show me the answer

Answer: 4. Intranet

Explanation:

  • An intranet is a private network used within an organization to facilitate communication and collaboration.

  1. Virus

  2. Trojan

  3. Worms

  4. Phishing

Show me the answer

Answer: 4. Phishing

Explanation:

  • Phishing attacks involve tricking users into revealing sensitive information by pretending to be a trustworthy entity.

36. In network communication, which medium has the highest data transmission speed?

  1. Optical Fiber

  2. Satellite

  3. Coaxial Cable

  4. Microwave Link

Show me the answer

Answer: 1. Optical Fiber

Explanation:

  • Optical fiber has the highest data transmission speed due to its ability to carry large amounts of data over long distances with minimal loss.

37. Which statement is false in case of Digital Signature?

  1. A digital signature is a mathematical algorithm routinely used to validate the authenticity and integrity of a message, software or digital document.

  2. Digital signature provides far more inherent security than handwritten signature.

  3. Just like a handwritten signature, a digital signature is unique for every document.

  4. None of these

Show me the answer

Answer: 3. Just like a handwritten signature, a digital signature is unique for every document.

Explanation:

  • A digital signature is unique to the sender and the document, but it is not the same as a handwritten signature.

38. In web applications, which security is applied in HTTPS?

  1. Application layer security

  2. Transport layer security

  3. Network layer security

  4. None of these

Show me the answer

Answer: 2. Transport layer security

Explanation:

  • HTTPS uses SSL/TLS (Secure Sockets Layer/Transport Layer Security) to encrypt communication at the transport layer.

39. In Nepal, the prevailing law which deals with the issues relating to cybercrime is......

  1. Electronic Transaction Act, 2063

  2. Criminal Act, 2074

  3. Copyright Act, 2059

  4. Right to-Information Act, 2064

Show me the answer

Answer: 1. Electronic Transaction Act, 2063

Explanation:

  • The Electronic Transaction Act, 2063, is the primary law in Nepal that deals with cybercrime and electronic transactions.

40. In OSI reference mode, which layer takes care that the data is sent in such a way that the receiver will understand the data or information and will be able to use the data?

  1. Transport layer

  2. Session layer

  3. Presentation layer

  4. Application layer

Show me the answer

Answer: 3. Presentation layer

Explanation:

  • The Presentation layer is responsible for translating data into a format that the application layer can understand.

41. An ______ is a network security tool that continuously monitors a network for harmful activity and takes corrective action to block it.

  1. Intrusion Detection System (IDS)

  2. Intrusion Prevention System (IPS)

  3. Both of the above

  4. None of these

Show me the answer

Answer: 2. Intrusion Prevention System (IPS)

Explanation:

  • An Intrusion Prevention System (IPS) actively monitors and blocks harmful activity on a network.

42. Which of the following statements is false in case of Denial of Services (DoS) and Distributed Denial of Services (DDoS) attacks?

  1. Both attacks overload a server, rendering a website or resource inaccessible to the intended users.

  2. DDoS attack is a DoS attack that floods a targeted resource with several computers or machines.

  3. DoS attack is faster as compared to DDoS.

  4. None of these

Show me the answer

Answer: 3. DoS attack is faster as compared to DDoS.

Explanation:

  • DDoS attacks are typically more powerful and faster than DoS attacks because they involve multiple machines.

43. Which statement is false in case of Digital Signature?

  1. A digital signature is a mathematical algorithm routinely used to validate the authenticity and integrity of a message, software or digital document.

  2. Digital signature provides far more inherent security than handwritten signature.

  3. Digital signature, like handwritten signature, becomes unique for each document.

  4. None of these

Show me the answer

Answer: 3. Digital signature, like handwritten signature, becomes unique for each document.

Explanation:

  • A digital signature is unique to the sender and the document, but it is not the same as a handwritten signature.

44. ___ command can be used to check network connectivity between the host and the server/host when troubleshooting computer networks?

  1. IPCONFIG

  2. PING

  3. TRACERT

  4. Both B and C

Show me the answer

Answer: 4. Both B and C

Explanation:

  • Both PING and TRACERT are used to check network connectivity and diagnose network issues.

45. An ___ is a private network that provides controlled access to authorized customers, vendors, partners, or others outside the company.

  1. Internet

  2. Intranet

  3. Extranet

  4. All of the above

Show me the answer

Answer: 3. Extranet

Explanation:

  • An extranet is a private network that allows controlled access to external users, such as customers or partners.

46. A network in which two or more PCs are linked together to share files and get access to common devices like printers, scanners is called

  1. Client – Server Network

  2. Peer to Peer Network

  3. Both of the above

  4. None of these

Show me the answer

Answer: 2. Peer to Peer Network

Explanation:

  • In a peer-to-peer network, devices share resources directly without the need for a central server.

47. Which of the following is not a network device?

  1. Hub

  2. Bridge

  3. Router

  4. Tape Drive

Show me the answer

Answer: 4. Tape Drive

Explanation:

  • A tape drive is a storage device and is not used for networking purposes.

48. A type of malicious code .which disguises itself as a desirable code or software but can take control of your computer is

  1. Virus

  2. Worms

  3. Trojan

  4. Phishing

Show me the answer

Answer: 3. Trojan

Explanation:

  • A Trojan disguises itself as legitimate software but can take control of a computer and perform malicious actions.

49. A piece of code intentionally inserted into a software system that will cause malicious function when specified conditions are met is called

  1. Worm

  2. Torjan horse

  3. Logic bomb

  4. None of these

Show me the answer

Answer: 3. Logic bomb

Explanation:

  • A logic bomb is a piece of code that executes a malicious function when certain conditions are met.

50. ___is not a valid subnet mask in computer networking.

  1. 255.0.255.0

  2. 255.255.255.248

  3. 255.255.248.0

  4. 255.0.0.0

Show me the answer

Answer: 1. 255.0.255.0

Explanation:

  • A valid subnet mask must have contiguous 1s followed by contiguous 0s. 255.0.255.0 is not a valid subnet mask.

Last updated