set-1
1. ______ is not true in case of OSI and TCP/IP model.
The OSI Model is a logical and conceptual model that defines how communication needs to be done
TCP/IP model depends on standard protocols that assigns the network of hosts over the Internet.
Both OSI and TCP/IP models are protocol independent
None of these
2. A computer has just been installed on the Ethernet LAN but it is not communicating with the network, then what should be done at first?
Update the NIC driver
Verify the IP address configuration on the workstation
Verify the connectivity on the computer’s network card
All of the above
3. Which of the following commands is not used in the troubleshooting of computer networks?
Ping
Tracert
Ipconfig
Chkdsk
4. In network troubleshooting, which of the following commands is used?
Netstat
Nslookup
Tracert
All of the above
5. Which server maintains a directory of domain names and translate them to Internet Protocol (IP) addresses.
DNS Server
DHCP Server
Web Server
Database Server
6. Which data link sub-layer carries out data link functions that depend upon the type of medium?
Logical link control
Media access control
Network interface control
Error Control
7. When connected to the Internet, the device used to perform modulation and demodulation is called
Trans receiver
Modem
Repeater
All of the above
8. An web-site is a collection of
Components of internet
Web-pages
Web links
All of the above
9. In web applications, ______ is the correct order to form URLs.
Protocol name, File name, DNS name
DNS name, Protocol name, File name
Protocol name, DNS name, File name
Protocol name, File name, DNS name
10. In computer networking, MAN lies in between LAN and WAN in terms of
Area coverage
Data transfer rate
Both of the above
None of these
11. Which type of network is an Internet?
LAN
MAN
WAN
All of the above
12. The most commonly used network media for small local area network is ______.
Twisted pair cable
Co-axial cable
Optical fiber
All of the above
13. In computer networking, a Network Interface Card (NIC) has
MAC address
IP address
Subnet mask
All of the above
14. Which statement is true in case of IP address?
Every computer connected to the network must have an IP address to communicate.
Every computer connected to the Internet must have an IP address to communicate.
Both of the above
None of these
15. Which of the following statement is false in case of IP
IP is an Internet path
Every computer must have an IP address
IP is a unique address of a computer connected to the network
Both A and B
16. In computer networking, the commonly used topology for LAN is ______.
Star topology
Ring topology
Bus topology
Tree topology
17. In network security, which statement is true in case of IPS?
IPS is a network security technology that examines network traffic flows to detect and prevent vulnerability exploits.
If an attack is detected, IPS can stop the malicious traffic before it makes it to rest of the network.
Both of the above
None of these
18. In network security, which statement is false in case of IPS and IDS?
IDS is a device or software application that monitors a network or systems for malicious activity or policy violations.
IPS controls access to IT networks in order to protect systems from attack and abuse.
IDS are designed to identify suspicious attacks and to take the corrective action to block them.
If an attack is detected, IPS can stop the malicious traffic before it makes it to rest of the network.
19. Which statement is false in case of peer-to-peer network?
In peer-to-peer networks all nodes are act as server as well as client.
Peer-to-peer network is easier to setup.
Peer-to-peer network is more expensive than client server network.
Each workstation on the network shares its files equally with the others.
20. In computer networking, most reliable network topology.
Bus topology
Mesh topology
Tree topology
None of these
21. Which networking device can perform Network Address Translation (NAT)?
Bridge
Switch
Router
All of the above
22. What is Data Encryption Standards (DES) used in network security?
It is symmetric key cryptography
It uses only one key for encryption and decryption
It is asymmetric key cryptography
Both A and B
23. Which of the following statement is true in case of IP address and MAC address?
Every network device must have IP address and MAC address to communicate.
IP address is logical address and MAC address is physical address.
IP address can be changed but MAC address can never be changed.
All of the above
24. What type of communication media is used to develop internet backbone for a bigger and wider Information Highway in the country?
Wireless microwave link
Co-axial cable
Optical fiber
All of the above
25. In OSI reference mode, which layer takes care that the data is sent in such a way that the receiver will understand the data or information and will be able to use the data?
Transport layer
Session layer
Presentation layer
Application layer
26. Which protocol is preferred for the streaming applications that require constant data flow, bulk data and fastness than reliability?
TCP
UDP
FTP
ARP
27. In HTTPS, the communication protocol is encrypted using......
Application layer security
Transport layer security
Network layer security
None of these
28. A malware which attempts to obtain sensitive information for malicious reasons, by disguising as a trustworthy entity is called......
Trojan horse
Phishing
Logic bomb
All of the above
29. Which of the following malware do not reproduce or replicate itself but is still destructive?
Virus
Trojan
Worm
Both B and C
30. A network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules is called
Router
Switch
Firewall
None of these
31. In computer networks, ______ is categorized in the computer related threats.
Phishing
Spyware
Trojan horse
All of the above
32. A universe of network-accessible information where web resources are identified by URLs and accessible via the Internet is called______.
Local Area Network (LAN)
Wide Area Network (WAN)
World Wide Web (WWW)
Storage Area Network (SAN)
33. In computer networking, ______ is not any network type.
Metropolitan Area Network
Public Area Network
Wireless Local Area Network
Personal Area Network
34. A private enterprise network which is designed to support an organization’s employees to communicate, collaborate and perform their roles in a secure manner is called......
Email
Internet
Extranet
Intranet
35. Which computer related threat attempts to obtain sensitive information by disguising as a trustworthy entity?
Virus
Trojan
Worms
Phishing
36. In network communication, which medium has the highest data transmission speed?
Optical Fiber
Satellite
Coaxial Cable
Microwave Link
37. Which statement is false in case of Digital Signature?
A digital signature is a mathematical algorithm routinely used to validate the authenticity and integrity of a message, software or digital document.
Digital signature provides far more inherent security than handwritten signature.
Just like a handwritten signature, a digital signature is unique for every document.
None of these
38. In web applications, which security is applied in HTTPS?
Application layer security
Transport layer security
Network layer security
None of these
39. In Nepal, the prevailing law which deals with the issues relating to cybercrime is......
Electronic Transaction Act, 2063
Criminal Act, 2074
Copyright Act, 2059
Right to-Information Act, 2064
40. In OSI reference mode, which layer takes care that the data is sent in such a way that the receiver will understand the data or information and will be able to use the data?
Transport layer
Session layer
Presentation layer
Application layer
41. An ______ is a network security tool that continuously monitors a network for harmful activity and takes corrective action to block it.
Intrusion Detection System (IDS)
Intrusion Prevention System (IPS)
Both of the above
None of these
42. Which of the following statements is false in case of Denial of Services (DoS) and Distributed Denial of Services (DDoS) attacks?
Both attacks overload a server, rendering a website or resource inaccessible to the intended users.
DDoS attack is a DoS attack that floods a targeted resource with several computers or machines.
DoS attack is faster as compared to DDoS.
None of these
43. Which statement is false in case of Digital Signature?
A digital signature is a mathematical algorithm routinely used to validate the authenticity and integrity of a message, software or digital document.
Digital signature provides far more inherent security than handwritten signature.
Digital signature, like handwritten signature, becomes unique for each document.
None of these
44. ___ command can be used to check network connectivity between the host and the server/host when troubleshooting computer networks?
IPCONFIG
PING
TRACERT
Both B and C
45. An ___ is a private network that provides controlled access to authorized customers, vendors, partners, or others outside the company.
Internet
Intranet
Extranet
All of the above
46. A network in which two or more PCs are linked together to share files and get access to common devices like printers, scanners is called
Client – Server Network
Peer to Peer Network
Both of the above
None of these
47. Which of the following is not a network device?
Hub
Bridge
Router
Tape Drive
48. A type of malicious code .which disguises itself as a desirable code or software but can take control of your computer is
Virus
Worms
Trojan
Phishing
49. A piece of code intentionally inserted into a software system that will cause malicious function when specified conditions are met is called
Worm
Torjan horse
Logic bomb
None of these
50. ___is not a valid subnet mask in computer networking.
255.0.255.0
255.255.255.248
255.255.248.0
255.0.0.0
Last updated