Computer Network Assignment-1 - 48433806 - 2025 - 01 - 27 - 11 - 26
Computer Network Assignment-1 - 48433806 - 2025 - 01 - 27 - 11 - 26
1. Which type of network is typically confined to a 7. Which network type is best suited for home automation
single building or campus? systems?
A. WAN A. PAN
B. MAN B. HAN
C. LAN C. CAN
D. More than one of the above D. More than one of the above
E. None of the above E. None of the above
2. Which network spans a city or a large campus? 8. Which network type provides secure connectivity over a
A. PAN public network?
B. MAN A. VPN
C. LAN B. EPN
D. More than one of the above C. WLAN
E. None of the above D. More than one of the above
E. None of the above
3. Which protocol is used to translate domain names into
IP addresses? 9. What does WLAN stand for?
A. ARP A. Wide Local Area Network
B. DNS B. Wireless Local Area Network
C. DHCP C. Wide Logical Area Network
D. More than one of the above D. More than one of the above
E. None of the above E. None of the above
4. Which network type is primarily used for personal 10. Which network is designed for secure communication within
devices within a range of a few meters? an organization?
A. LAN A. Intranet
B. PAN B. Extranet
C. WAN C. Internet
D. More than one of the above D. More than one of the above
E. None of the above E. None of the above
5. Which type of network is designed for educational 11. What is the primary difference between an Extranet and an
institutions or corporate campuses? Intranet?
A. CAN A. Extranet is publicly accessible
B. MAN B. Extranet allows limited external access
C. WAN C. Intranet uses wireless technology
D. More than one of the above D. More than one of the above
E. None of the above E. None of the above
6. What does SAN stand for in networking? 12. Which topology connects all devices in a circular
A. System Area Network arrangement?
B. Storage Area Network A. Star
C. Secure Area Network B. Ring
D. More than one of the above C. Mesh
E. None of the above D. More than one of the above
E. None of the above
14. Which topology provides multiple paths for data 20. What is the main purpose of a VPN?
transmission? A. To connect storage devices
A. Mesh B. To secure communication over public networks
B. Star C. To connect devices within a home
C. Ring D. More than one of the above
D. More than one of the above E. None of the above
E. None of the above
21. Which topology requires a terminator at both ends of the
communication line?
15. Which protocol is used for sending emails?
A. Bus
A. HTTP
B. Ring
B. SMTP
C. Star
C. FTP
D. More than one of the above
D. More than one of the above
E. None of the above
E. None of the above
22. Which protocol is used for secure communication on the
16. Which network topology is most cost-effective for web?
small networks? A. HTTPS
A. Star B. SSH
B. Bus C. TLS
C. Mesh D. More than one of the above
D. More than one of the above E. None of the above
E. None of the above
23. Which network type is commonly used for connecting IoT
17. Which of the following protocols is primarily used devices in a home?
for web browsing? A. HAN
A. HTTP B. PAN
B. FTP C. WLAN
C. Telnet D. More than one of the above
D. More than one of the above E. None of the above
E. None of the above
24. What is the primary purpose of an Extranet?
18. What is a key characteristic of a Mesh topology? A. To provide public access to resources
A. All devices are connected to a central hub B. To allow external users limited access to an organization's
B. Devices are connected in a linear sequence network
C. Devices have multiple connections to other devices C. To connect personal devices within a short range
D. More than one of the above D. More than one of the above
E. None of the above E. None of the above
27. What does EPN stand for? 33. What type of signal is used in traditional telephony
A. Enterprise Private Network systems?
B. Extended Public Network A. Analog signal
C. Encrypted Private Network B. Digital signal
D. More than one of the above C. Both A and B
E. None of the above D. More than one of the above
E. None of the above
28. Which topology is most resilient to node failures?
A. Ring 34. Which of the following devices operates at the Data Link
B. Mesh layer of the OSI model?
C. Star A. Router
D. More than one of the above B. Switch
E. None of the above C. Hub
D. More than one of the above
29. Which type of network is specifically designed for E. None of the above
high-performance computing clusters?
A. Storage area Network 35. Which of the following switching techniques uses a
B. System Area Network dedicated communication path between sender and
C. CAN receiver?
D. More than one of the above A. Circuit switching
E. None of the above B. Packet switching
C. Message switching
30. Which protocol is commonly used for retrieving D. More than one of the above
emails from a server? E. None of the above
A. SMTP
B. IMAP 36. Which transmission mode is most suitable for video
C. POP3 conferencing?
D. More than one of the above A. Simplex
E. None of the above B. Half-duplex
C. Full-duplex
31. Which of the following is a transmission mode where D. More than one of the above
data flows in both directions, but only one direction E. None of the above
at a time?
A. Simplex 37. Which of the following is NOT true about fiber-optic cables?
B. Half-duplex A. Immune to electromagnetic interference
C. Full-duplex B. High bandwidth
D. More than one of the above C. Susceptible to crosstalk
E. None of the above D. Made of glass or plastic
E. None of the above
39. Which of the following is a key difference between 45. Which of the following best describes frequency-division
analog and digital signals? multiplexing (FDM)?
A. Analog signals are discrete, while digital signals A. Multiple signals are combined based on time slots.
are continuous. B. Multiple signals are transmitted on different frequency
B. Digital signals are discrete, while analog signals bands.
are continuous. C. Signals are transmitted sequentially in a round-robin
C. Analog signals are immune to noise, while digital manner.
signals are not. D. More than one of the abov.
D. More than one of the above E. None of the above
E. None of the above
46. Which switching technique stores the entire message
40. Which switching technique is most commonly used before forwarding it to the destination?
in the Internet? A. Circuit switching
A. Circuit switching B. Packet switching
B. Packet switching C. Message switching
C. Message switching D. More than one of the above
D. More than one of the above E. None of the above
E. None of the above
47. What is the primary disadvantage of circuit switching?
41. Which device is used to regenerate and amplify A. High latency for real-time communication
signals in a network? B. Inefficient use of bandwidth
A. Hub C. Data loss during transmission
B. Repeater D. More than one of the above
C. Bridge E. None of the above
D. More than one of the above
E. None of the above 48. Which of the following is a disadvantage of unguided
transmission media?
42. Which transmission medium is most suitable for A. High susceptibility to interference
long-distance communication with minimal signal B. Limited mobility
loss? C. High installation cost
A. Twisted-pair cable D. More than one of the above
B. Coaxial cable E. None of the above
C. Fiber-optic cable
D. More than one of the above 49. Which of the following is NOT a characteristic of digital
E. None of the above signals?
A. Noise resistance
43. Which of the following transmission media is most B. Continuous waveform
susceptible to electromagnetic interference? C. Represented by binary values
A. Twisted-pair cable D. More than one of the above
B. Coaxial cable E. None of the above
C. Fiber-optic cable
D. More than one of the above
E. None of the above
51. Which switching technique delivers data packets 57. Which property of digital signals makes them preferable for
independently without maintaining a dedicated long-distance communication?
path? A. Continuous waveform
A. Circuit switching B. Noise resistance
B. Packet switching C. High signal attenuation
C. Message switching D. More than one of the above
D. More than one of the above E. None of the above
E. None of the above
58. Which of the following is true about analog signals?
52. Which transmission mode is ideal for broadcasting a A. They use discrete values.
TV signal? B. They are less affected by noise.
A. Simplex C. They are continuous waveforms.
B. Half-duplex D. More than one of the above
C. Full-duplex E. None of the above
D. More than one of the above
E. None of the above 59. Which switching technique is most efficient for transmitting
large files?
53. Which of the following devices operates at the A. Circuit switching
Network layer of the OSI model? B. Packet switching
A. Router C. Message switching
B. Switch D. More than one of the above
C. Bridge E. None of the above
D. More than one of the above
E. None of the above 60. Which of the following is a characteristic of packet
switching?
54. Which switching technique is best suited for real- A. Dedicated communication path
time voice and video communication? B. Data divided into packets
A. Circuit switching C. High latency for real-time applications
B. Packet switching D. More than one of the above
C. Message switching E. None of the above
D. More than one of the above
E. None of the above 61. Which layer of the OSI model is responsible for error
detection and correction?
55. Which type of multiplexing is commonly used in A. Network Layer
optical fiber communication? B. Data Link Layer
A. Time-division multiplexing (TDM) C. Transport Layer
B. Frequency-division multiplexing (FDM) D. More than one of the above
C. Wavelength-division multiplexing (WDM) E. None of the above
D. More than one of the above
E. None of the above
75. Which of the following devices operates at multiple 81. Which OSI layer is responsible for managing hardware
OSI layers? transmission errors?
A. Gateway A. Physical Layer
B. Repeater B. Data Link Layer
C. Hub C. Network Layer
D. More than one of the above D. More than one of the above
E. None of the above E. None of the above
76. Which layer of the OSI model is responsible for 82. What is the primary role of a firewall in a network?
packet forwarding, including routing? A. Data encryption
A. Transport Layer B. Packet filtering
B. Network Layer C. Signal amplification
C. Data Link Layer D. More than one of the above
D. More than one of the above E. None of the above
E. None of the above
83. Which OSI layer defines the electrical and mechanical
77. What is the role of the Session Layer in the OSI characteristics of the network?
model? A. Data Link Layer
A. Data segmentation B. Physical Layer
B. Synchronization of communication C. Network Layer
C. Address resolution D. More than one of the above
D. More than one of the above E. None of the above
E. None of the above
84. Which OSI layer provides services like email, file transfer, and
78. Which OSI layer is responsible for framing and remote login?
physical addressing? A. Application Layer
A. Data Link Layer B. Presentation Layer
B. Network Layer C. Session Layer
C. Transport Layer D. More than one of the above
D. More than one of the above E. None of the above
E. None of the above
85. At which OSI layer does a modem primarily operate?
A. Physical Layer
79. Which layer of the OSI model ensures end-to-end
B. Data Link Layer
delivery of data?
C. Network Layer
A. Network Layer
D. More than one of the above
B. Transport Layer
E. None of the above
C. Data Link Layer
D. More than one of the above 86. Which OSI layer is responsible for logical addressing and path
E. None of the above determination?
A. Data Link Layer
B. Network Layer
C. Transport Layer
D. More than one of the above
E. None of the above
Subscribe Infeepedia youtube channel for computer science competitive exams
Download Infeepedia app and call or wapp on 8004391758
Computer Networks Infeepedia By: Infee Tripathi
87. Which device acts as a central point for wireless 93. What is the primary purpose of Access Control Lists (ACLs)?
devices to connect to a network? A. Manage user authentication
A. Firewall B. Define permissions for resources
B. Access Point C. Encrypt sensitive data
C. Switch D. More than one of the above
D. More than one of the above E. None of the above
E. None of the above
94. Which of the following techniques is used for error
88. Which OSI layer is responsible for breaking data detection?
into smaller segments for transmission? A. CRC
A. Data Link Layer B. Checksum
B. Transport Layer C. Hamming Code
C. Network Layer D. More than one of the above
D. More than one of the above E. None of the above
E. None of the above
95. What is a characteristic of firewalls?
89. What is the primary function of a Network Interface A. Operates only at the Physical Layer
Card (NIC)? B. Blocks unauthorized access
A. Enables network connectivity C. Amplifies network signals
B. Provides data encryption D. More than one of the above
C. Manages error correction E. None of the above
D. More than one of the above
E. None of the above 96. Which error correction technique is suitable for correcting
burst errors?
90. Which of the following is a function of a firewall in a A. Hamming Code
network? B. Reed-Solomon Code
A. Packet filtering C. Parity Check
B. Signal amplification D. More than one of the above
C. Data compression E. None of the above
D. More than one of the above
E. None of the above 97. What is the primary function of a checksum?
A. Error detection
91. Which error detection technique uses parity bits to B. Error correction
identify errors? C. Data encryption
A. CRC D. More than one of the above
B. Checksum E. None of the above
C. Parity Check
D. More than one of the above 98. Which error detection technique is most suitable for
E. None of the above detecting burst errors?
A. Parity Check
92. Which error correction technique uses redundant B. CRC
bits to fix errors? C. Checksum
A. Hamming Code D. More than one of the above
B. Parity Check E. None of the above
C. Cyclic Redundancy Check (CRC)
D. More than one of the above 99. What is a key advantage of using firewalls?
E. None of the above A. Enhanced data compression
B. Prevention of unauthorized access
C. Amplification of network signals
D. More than one of the above
E. None of the above
101. Which protocol is responsible for logical 108. Which sublayer handles access to the physical medium?
addressing in the network layer? A. LLC
A. IP B. MAC
B. ARP C. Transport
C. ICMP D. More than one of the above
D. More than one of the above E. None of the above
E. None of the above
109. Which protocol is used for connectionless communication
102. Which protocol is used to map IP addresses to
at the transport layer?
MAC addresses?
A. TCP
A. ICMP
B. UDP
B. ARP
C. SCTP
C. RARP
D. More than one of the above
D. More than one of the above
E. None of the above
E. None of the above
103. Which protocol provides error reporting and 110. Which sublayer of the data link layer is responsible for error
diagnostics at the network layer? detection?
A. IP A. LLC
B. ICMP B. MAC
C. OSPF C. Network
D. More than one of the above D. More than one of the above
E. None of the above E. None of the above
104. Which protocol is used for routing within an 111. Which protocol is responsible for logical addressing in the
autonomous system? network layer?
A. RIP A. IP
B. OSPF B. ARP
C. BGP C. ICMP
D. More than one of the above D. More than one of the above
E. None of the above E. None of the above
105. Which protocol is used to route multicast traffic? 112. Which protocol is used to map IP addresses to MAC
A. IGMP addresses?
B. PIM A. ICMP
C. RIP B. ARP
D. More than one of the above C. RARP
E. None of the above D. More than one of the above
106. Which protocol provides reliable communication E. None of the above
at the transport layer?
A. UDP
B. TCP
C. ICMP
D. More than one of the above
E. None of the above
Subscribe Infeepedia youtube channel for computer science competitive exams
Download Infeepedia app and call or wapp on 8004391758
Computer Networks Infeepedia By: Infee Tripathi
113. Which protocol provides error reporting and
diagnostics at the network layer?
A. IP
B. ICMP
C. OSPF
D. More than one of the above
E. None of the above
20. Answer: B. To secure communication over public 27. Answer: A. Enterprise Private Network
networks Explanation: An Enterprise Private Network (EPN) is a
Explanation: A Virtual Private Network (VPN) creates an private network used by organizations to securely
encrypted connection over a public network like the connect various branches and offices. It ensures efficient
Internet. It ensures data privacy and security, often used and secure communication across the enterprise.
for remote work and accessing restricted resources.
28. Answer: B. Mesh
21. Answer: A. Bus Explanation: Mesh topology is highly resilient because it
Explanation: In a Bus topology, a single communication provides multiple paths for data transmission. If one
line connects all devices, and terminators are required at node or connection fails, data can still be transmitted
both ends to prevent signal reflection. Without through alternate paths.
terminators, data transmission would be disrupted.
29. Answer: B. System Area Network
22. Answer: D. More than one of the above
Explanation: A System Area Network (SAN) connects
Explanation: HTTPS (Hypertext Transfer Protocol Secure) is
high-performance computing nodes in a cluster,
HTTP combined with encryption provided by TLS
providing low-latency and high-bandwidth
(Transport Layer Security). TLS ensures data integrity and
communication. It is commonly used in supercomputing
confidentiality over the network. SSH (Secure Shell) is not
environments.
for web communication but provides secure remote
access. Both HTTPS and TLS contribute to secure
communication in web applications.
94. Answer: D. More than one of the above 102. Answer: B. ARP
Explanation: Both CRC (Cyclic Redundancy Check) and Explanation:The Address Resolution Protocol (ARP)
Checksum are error detection techniques. CRC uses maps IP addresses to MAC addresses in a local
polynomial division to detect errors, while Checksum network. It ensures that packets sent at the network
calculates the sum of data segments. Hamming Code, on layer reach the correct device at the data link layer.
the other hand, is an error correction technique. RARP performs the reverse operation, mapping MAC
addresses to IP addresses.
95. Answer: B. Blocks unauthorized access
Explanation: Firewalls block unauthorized access to a
network by filtering traffic based on predefined rules.
They operate at multiple layers, primarily the Network
and Transport layers. They do not amplify signals or
operate at the Physical Layer.
Subscribe Infeepedia youtube channel for computer science competitive exams
Download Infeepedia app and call or wapp on 8004391758
Computer Networks Infeepedia By: Infee Tripathi
103. Answer: B. ICMP 110. Answer: B. LLC
Explanation: The Internet Control Message Protocol Explanation: The LLC (Logical Link Control) sublayer
(ICMP) is used for error reporting and network handles error detection and correction through
diagnostics. For example, it is used in the "ping" techniques like CRC (Cyclic Redundancy Check), flow
command to check connectivity. OSPF is a routing control and logical addressing. Network is not a data
protocol, and IP is used for addressing and routing but link sublayer.
does not handle diagnostics.
111. Answer: A. IP
104. Answer: D. More than one of the above Explanation:The Internet Protocol (IP) is the primary
Explanation: Both RIP (Routing Information Protocol) and protocol at the network layer, responsible for logical
OSPF (Open Shortest Path First) are used for routing addressing and routing packets between devices. It
within an autonomous system. RIP uses distance-vector ensures that data packets are delivered to the correct
routing, while OSPF uses link-state routing. BGP (Border destination using IP addresses. ARP resolves MAC
Gateway Protocol) is used for routing between addresses, and ICMP handles error reporting and
autonomous systems. diagnostics.
105. Answer: D. More than one of the above 112. Answer: B. ARP
Explanation: IGMP (Internet Group Management Explanation: The Address Resolution Protocol (ARP)
Protocol) manages multicast group memberships, while maps IP addresses to MAC addresses in a local
PIM (Protocol Independent Multicast) routes multicast network. It ensures that packets sent at the network
traffic efficiently. RIP is unrelated to multicast, as it is layer reach the correct device at the data link layer.
used for unicast routing. RARP performs the reverse operation, mapping MAC
addresses to IP addresses.
106 Answer: B. TCP
Explanation: The Transmission Control Protocol (TCP) 113. Answer: B. ICMP
ensures reliable communication through mechanisms like Explanation: The Internet Control Message Protocol
acknowledgment, retransmission, and flow control. UDP (ICMP) is used for error reporting and network
(User Datagram Protocol) is connectionless and does not diagnostics. For example, it is used in the "ping"
guarantee reliability. ICMP operates at the network layer command to check connectivity. OSPF is a routing
for error reporting. protocol, and IP is used for addressing and routing but
does not handle diagnostics.
107. Answer: D. More than one of the above
Explanation: UDP and SCTP (Stream Control Transmission 114. Answer: B. POP3
Protocol) are used for real-time communication. UDP is Explanation: POP3 (Post Office Protocol) used for
lightweight and suitable for latency-sensitive applications downloading emails. POP3 downloads emails to the
like VoIP. SCTP combines features of TCP and UDP, client and deletes them from the server, while IMAP
providing reliability for multimedia and signaling. synchronizes emails across devices. SMTP is used for
sending emails.
108. Answer: B. MAC
Explanation: The MAC sublayer manages access to the 115. Answer: b. PIM
physical medium, ensuring that multiple devices can Explanation: IGMP (Internet Group Management
share the same channel without collisions. LLC operates Protocol) manages multicast group memberships, while
above MAC, handling logical connections. Transport is a PIM (Protocol Independent Multicast) routes multicast
higher-layer function. traffic efficiently. RIP is unrelated to multicast, as it is
used for unicast routing.
109. Answer: B. UDP
Explanation: UDP (User Datagram Protocol) is a
connectionless protocol that sends data without
establishing a connection. It is lightweight and suitable
for applications like DNS queries and video streaming.
TCP and SCTP are connection-oriented.