0% found this document useful (0 votes)
6 views19 pages

Computer Network Assignment-1 - 48433806 - 2025 - 01 - 27 - 11 - 26

The document is an assignment on computer networks covering various topics such as types of networks, transmission media, protocols, and the OSI model. It includes multiple-choice questions that assess knowledge on network types, protocols, topologies, and communication methods. The content is structured in a quiz format, making it suitable for students preparing for computer science competitive exams.

Uploaded by

raviraj66raj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views19 pages

Computer Network Assignment-1 - 48433806 - 2025 - 01 - 27 - 11 - 26

The document is an assignment on computer networks covering various topics such as types of networks, transmission media, protocols, and the OSI model. It includes multiple-choice questions that assess knowledge on network types, protocols, topologies, and communication methods. The content is structured in a quiz format, making it suitable for students preparing for computer science competitive exams.

Uploaded by

raviraj66raj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

Computer Networks Infeepedia By: Infee Tripathi

Assignment - #1(Types, Transmission media&mode,OSI Model/Protocols)


Computer Networks

1. Which type of network is typically confined to a 7. Which network type is best suited for home automation
single building or campus? systems?
A. WAN A. PAN
B. MAN B. HAN
C. LAN C. CAN
D. More than one of the above D. More than one of the above
E. None of the above E. None of the above

2. Which network spans a city or a large campus? 8. Which network type provides secure connectivity over a
A. PAN public network?
B. MAN A. VPN
C. LAN B. EPN
D. More than one of the above C. WLAN
E. None of the above D. More than one of the above
E. None of the above
3. Which protocol is used to translate domain names into
IP addresses? 9. What does WLAN stand for?
A. ARP A. Wide Local Area Network
B. DNS B. Wireless Local Area Network
C. DHCP C. Wide Logical Area Network
D. More than one of the above D. More than one of the above
E. None of the above E. None of the above

4. Which network type is primarily used for personal 10. Which network is designed for secure communication within
devices within a range of a few meters? an organization?
A. LAN A. Intranet
B. PAN B. Extranet
C. WAN C. Internet
D. More than one of the above D. More than one of the above
E. None of the above E. None of the above

5. Which type of network is designed for educational 11. What is the primary difference between an Extranet and an
institutions or corporate campuses? Intranet?
A. CAN A. Extranet is publicly accessible
B. MAN B. Extranet allows limited external access
C. WAN C. Intranet uses wireless technology
D. More than one of the above D. More than one of the above
E. None of the above E. None of the above

6. What does SAN stand for in networking? 12. Which topology connects all devices in a circular
A. System Area Network arrangement?
B. Storage Area Network A. Star
C. Secure Area Network B. Ring
D. More than one of the above C. Mesh
E. None of the above D. More than one of the above
E. None of the above

Subscribe Infeepedia youtube channel for computer science competitive exams


Download Infeepedia app and call or wapp on 8004391758
Computer Networks Infeepedia By: Infee Tripathi
13. Which of the following protocols is used for file 19. Which network is used to connect storage devices in a
transfer? dedicated manner?
A. FTP A. SAN
B. TFTP B. CAN
C. SCP C. VPN
D. More than one of the above D. More than one of the above
E. None of the above E. None of the above

14. Which topology provides multiple paths for data 20. What is the main purpose of a VPN?
transmission? A. To connect storage devices
A. Mesh B. To secure communication over public networks
B. Star C. To connect devices within a home
C. Ring D. More than one of the above
D. More than one of the above E. None of the above
E. None of the above
21. Which topology requires a terminator at both ends of the
communication line?
15. Which protocol is used for sending emails?
A. Bus
A. HTTP
B. Ring
B. SMTP
C. Star
C. FTP
D. More than one of the above
D. More than one of the above
E. None of the above
E. None of the above
22. Which protocol is used for secure communication on the
16. Which network topology is most cost-effective for web?
small networks? A. HTTPS
A. Star B. SSH
B. Bus C. TLS
C. Mesh D. More than one of the above
D. More than one of the above E. None of the above
E. None of the above
23. Which network type is commonly used for connecting IoT
17. Which of the following protocols is primarily used devices in a home?
for web browsing? A. HAN
A. HTTP B. PAN
B. FTP C. WLAN
C. Telnet D. More than one of the above
D. More than one of the above E. None of the above
E. None of the above
24. What is the primary purpose of an Extranet?
18. What is a key characteristic of a Mesh topology? A. To provide public access to resources
A. All devices are connected to a central hub B. To allow external users limited access to an organization's
B. Devices are connected in a linear sequence network
C. Devices have multiple connections to other devices C. To connect personal devices within a short range
D. More than one of the above D. More than one of the above
E. None of the above E. None of the above

25. Which topology combines the characteristics of Star and Bus


topologies?
A. Mesh
B. Hybrid
C. Ring
D. More than one of the above
E. None of the above
Subscribe Infeepedia youtube channel for computer science competitive exams
Download Infeepedia app and call or wapp on 8004391758
Computer Networks Infeepedia By: Infee Tripathi
26. Which protocol is used for real-time voice 32. Which of the following is NOT an example of guided
communication? transmission media?
A. RTP A. Coaxial cable
B. SIP B. Fiber-optic cable
C. VoIP C. Twisted-pair cable
D. More than one of the above D. Radio waves
E. None of the above E. None of the above

27. What does EPN stand for? 33. What type of signal is used in traditional telephony
A. Enterprise Private Network systems?
B. Extended Public Network A. Analog signal
C. Encrypted Private Network B. Digital signal
D. More than one of the above C. Both A and B
E. None of the above D. More than one of the above
E. None of the above
28. Which topology is most resilient to node failures?
A. Ring 34. Which of the following devices operates at the Data Link
B. Mesh layer of the OSI model?
C. Star A. Router
D. More than one of the above B. Switch
E. None of the above C. Hub
D. More than one of the above
29. Which type of network is specifically designed for E. None of the above
high-performance computing clusters?
A. Storage area Network 35. Which of the following switching techniques uses a
B. System Area Network dedicated communication path between sender and
C. CAN receiver?
D. More than one of the above A. Circuit switching
E. None of the above B. Packet switching
C. Message switching
30. Which protocol is commonly used for retrieving D. More than one of the above
emails from a server? E. None of the above
A. SMTP
B. IMAP 36. Which transmission mode is most suitable for video
C. POP3 conferencing?
D. More than one of the above A. Simplex
E. None of the above B. Half-duplex
C. Full-duplex
31. Which of the following is a transmission mode where D. More than one of the above
data flows in both directions, but only one direction E. None of the above
at a time?
A. Simplex 37. Which of the following is NOT true about fiber-optic cables?
B. Half-duplex A. Immune to electromagnetic interference
C. Full-duplex B. High bandwidth
D. More than one of the above C. Susceptible to crosstalk
E. None of the above D. Made of glass or plastic
E. None of the above

Subscribe Infeepedia youtube channel for computer science competitive exams


Download Infeepedia app and call or wapp on 8004391758
Computer Networks Infeepedia By: Infee Tripathi
38. Which protocol is used for network management 44. Which device connects two LAN segments and filters traffic
and monitoring? based on MAC addresses?
A. SNMP A. Repeater
B. ICMP B. Bridge
C. Telnet C. Hub
D. More than one of the above D. More than one of the above
E. None of the above E. None of the above

39. Which of the following is a key difference between 45. Which of the following best describes frequency-division
analog and digital signals? multiplexing (FDM)?
A. Analog signals are discrete, while digital signals A. Multiple signals are combined based on time slots.
are continuous. B. Multiple signals are transmitted on different frequency
B. Digital signals are discrete, while analog signals bands.
are continuous. C. Signals are transmitted sequentially in a round-robin
C. Analog signals are immune to noise, while digital manner.
signals are not. D. More than one of the abov.
D. More than one of the above E. None of the above
E. None of the above
46. Which switching technique stores the entire message
40. Which switching technique is most commonly used before forwarding it to the destination?
in the Internet? A. Circuit switching
A. Circuit switching B. Packet switching
B. Packet switching C. Message switching
C. Message switching D. More than one of the above
D. More than one of the above E. None of the above
E. None of the above
47. What is the primary disadvantage of circuit switching?
41. Which device is used to regenerate and amplify A. High latency for real-time communication
signals in a network? B. Inefficient use of bandwidth
A. Hub C. Data loss during transmission
B. Repeater D. More than one of the above
C. Bridge E. None of the above
D. More than one of the above
E. None of the above 48. Which of the following is a disadvantage of unguided
transmission media?
42. Which transmission medium is most suitable for A. High susceptibility to interference
long-distance communication with minimal signal B. Limited mobility
loss? C. High installation cost
A. Twisted-pair cable D. More than one of the above
B. Coaxial cable E. None of the above
C. Fiber-optic cable
D. More than one of the above 49. Which of the following is NOT a characteristic of digital
E. None of the above signals?
A. Noise resistance
43. Which of the following transmission media is most B. Continuous waveform
susceptible to electromagnetic interference? C. Represented by binary values
A. Twisted-pair cable D. More than one of the above
B. Coaxial cable E. None of the above
C. Fiber-optic cable
D. More than one of the above
E. None of the above

Subscribe Infeepedia youtube channel for computer science competitive exams


Download Infeepedia app and call or wapp on 8004391758
Computer Networks Infeepedia By: Infee Tripathi
50. Which network device is responsible for dividing a 56. Which of the following devices works as a central connection
network into multiple collision domains? point in a star topology?
A. Hub A. Hub
B. Switch B. Switch
C. Router C. Router
D. More than one of the above D. More than one of the above
E. None of the above E. None of the above

51. Which switching technique delivers data packets 57. Which property of digital signals makes them preferable for
independently without maintaining a dedicated long-distance communication?
path? A. Continuous waveform
A. Circuit switching B. Noise resistance
B. Packet switching C. High signal attenuation
C. Message switching D. More than one of the above
D. More than one of the above E. None of the above
E. None of the above
58. Which of the following is true about analog signals?
52. Which transmission mode is ideal for broadcasting a A. They use discrete values.
TV signal? B. They are less affected by noise.
A. Simplex C. They are continuous waveforms.
B. Half-duplex D. More than one of the above
C. Full-duplex E. None of the above
D. More than one of the above
E. None of the above 59. Which switching technique is most efficient for transmitting
large files?
53. Which of the following devices operates at the A. Circuit switching
Network layer of the OSI model? B. Packet switching
A. Router C. Message switching
B. Switch D. More than one of the above
C. Bridge E. None of the above
D. More than one of the above
E. None of the above 60. Which of the following is a characteristic of packet
switching?
54. Which switching technique is best suited for real- A. Dedicated communication path
time voice and video communication? B. Data divided into packets
A. Circuit switching C. High latency for real-time applications
B. Packet switching D. More than one of the above
C. Message switching E. None of the above
D. More than one of the above
E. None of the above 61. Which layer of the OSI model is responsible for error
detection and correction?
55. Which type of multiplexing is commonly used in A. Network Layer
optical fiber communication? B. Data Link Layer
A. Time-division multiplexing (TDM) C. Transport Layer
B. Frequency-division multiplexing (FDM) D. More than one of the above
C. Wavelength-division multiplexing (WDM) E. None of the above
D. More than one of the above
E. None of the above

Subscribe Infeepedia youtube channel for computer science competitive exams


Download Infeepedia app and call or wapp on 8004391758
Computer Networks Infeepedia By: Infee Tripathi
62. Which OSI layer is responsible for establishing, 68. Which OSI layer handles flow control and segmentation of
managing, and terminating communication data?
sessions? A. Transport Layer
A. Transport Layer B. Data Link Layer
B. Session Layer C. Network Layer
C. Presentation Layer D. More than one of the above
D. More than one of the above E. None of the above
E. None of the above
69. Which device operates at the Physical Layer of the OSI
63. Which device connects multiple networks and model?
directs data packets based on IP addresses? A. Repeater
A. Switch B. Router
B. Router C. Firewall
C. Gateway D. More than one of the above
D. More than one of the above E. None of the above
E. None of the above
70. Which OSI layer is responsible for ensuring data integrity and
64. Which OSI layer is responsible for converting data reliable communication?
into a format suitable for transmission? A. Transport Layer
A. Application Layer B. Network Layer
B. Presentation Layer C. Session Layer
C. Transport Layer D. More than one of the above
D. More than one of the above E. None of the above
E. None of the above
71. Which of the following protocols operate at the Application
65. Which of the following devices can provide network Layer of the OSI model?
security by filtering incoming and outgoing traffic? A. HTTP
A. Firewall B. FTP
B. Modem C. SMTP
C. NIC D. More than one of the above
D. More than one of the above E. None of the above
E. None of the above
72. What is the primary function of the Network Interface Card
66. Which OSI layer is responsible for routing and (NIC)?
forwarding data packets? A. Data encryption
A. Transport Layer B. Network connectivity
B. Network Layer C. Routing
C. Data Link Layer D. More than one of the above
D. More than one of the above E. None of the above
E. None of the above
73. Which OSI layer is responsible for data compression and
67. What is the primary function of a gateway in a encryption?
network? A. Session Layer
A. Connect devices within a LAN B. Presentation Layer
B. Connect networks using different protocols C. Application Layer
C. Filter network traffic D. More than one of the above
D. More than one of the above E. None of the above
E. None of the above

Subscribe Infeepedia youtube channel for computer science competitive exams


Download Infeepedia app and call or wapp on 8004391758
Computer Networks Infeepedia By: Infee Tripathi
74. Which OSI layer converts data into signals suitable 80. Which of the following devices works at the Application
for transmission over the physical medium? Layer of the OSI model?
A. Network Layer A. Gateway
B. Physical Layer B. Firewall
C. Data Link Layer C. Modem
D. More than one of the above D. More than one of the above
E. None of the above E. None of the above

75. Which of the following devices operates at multiple 81. Which OSI layer is responsible for managing hardware
OSI layers? transmission errors?
A. Gateway A. Physical Layer
B. Repeater B. Data Link Layer
C. Hub C. Network Layer
D. More than one of the above D. More than one of the above
E. None of the above E. None of the above

76. Which layer of the OSI model is responsible for 82. What is the primary role of a firewall in a network?
packet forwarding, including routing? A. Data encryption
A. Transport Layer B. Packet filtering
B. Network Layer C. Signal amplification
C. Data Link Layer D. More than one of the above
D. More than one of the above E. None of the above
E. None of the above
83. Which OSI layer defines the electrical and mechanical
77. What is the role of the Session Layer in the OSI characteristics of the network?
model? A. Data Link Layer
A. Data segmentation B. Physical Layer
B. Synchronization of communication C. Network Layer
C. Address resolution D. More than one of the above
D. More than one of the above E. None of the above
E. None of the above
84. Which OSI layer provides services like email, file transfer, and
78. Which OSI layer is responsible for framing and remote login?
physical addressing? A. Application Layer
A. Data Link Layer B. Presentation Layer
B. Network Layer C. Session Layer
C. Transport Layer D. More than one of the above
D. More than one of the above E. None of the above
E. None of the above
85. At which OSI layer does a modem primarily operate?
A. Physical Layer
79. Which layer of the OSI model ensures end-to-end
B. Data Link Layer
delivery of data?
C. Network Layer
A. Network Layer
D. More than one of the above
B. Transport Layer
E. None of the above
C. Data Link Layer
D. More than one of the above 86. Which OSI layer is responsible for logical addressing and path
E. None of the above determination?
A. Data Link Layer
B. Network Layer
C. Transport Layer
D. More than one of the above
E. None of the above
Subscribe Infeepedia youtube channel for computer science competitive exams
Download Infeepedia app and call or wapp on 8004391758
Computer Networks Infeepedia By: Infee Tripathi
87. Which device acts as a central point for wireless 93. What is the primary purpose of Access Control Lists (ACLs)?
devices to connect to a network? A. Manage user authentication
A. Firewall B. Define permissions for resources
B. Access Point C. Encrypt sensitive data
C. Switch D. More than one of the above
D. More than one of the above E. None of the above
E. None of the above
94. Which of the following techniques is used for error
88. Which OSI layer is responsible for breaking data detection?
into smaller segments for transmission? A. CRC
A. Data Link Layer B. Checksum
B. Transport Layer C. Hamming Code
C. Network Layer D. More than one of the above
D. More than one of the above E. None of the above
E. None of the above
95. What is a characteristic of firewalls?
89. What is the primary function of a Network Interface A. Operates only at the Physical Layer
Card (NIC)? B. Blocks unauthorized access
A. Enables network connectivity C. Amplifies network signals
B. Provides data encryption D. More than one of the above
C. Manages error correction E. None of the above
D. More than one of the above
E. None of the above 96. Which error correction technique is suitable for correcting
burst errors?
90. Which of the following is a function of a firewall in a A. Hamming Code
network? B. Reed-Solomon Code
A. Packet filtering C. Parity Check
B. Signal amplification D. More than one of the above
C. Data compression E. None of the above
D. More than one of the above
E. None of the above 97. What is the primary function of a checksum?
A. Error detection
91. Which error detection technique uses parity bits to B. Error correction
identify errors? C. Data encryption
A. CRC D. More than one of the above
B. Checksum E. None of the above
C. Parity Check
D. More than one of the above 98. Which error detection technique is most suitable for
E. None of the above detecting burst errors?
A. Parity Check
92. Which error correction technique uses redundant B. CRC
bits to fix errors? C. Checksum
A. Hamming Code D. More than one of the above
B. Parity Check E. None of the above
C. Cyclic Redundancy Check (CRC)
D. More than one of the above 99. What is a key advantage of using firewalls?
E. None of the above A. Enhanced data compression
B. Prevention of unauthorized access
C. Amplification of network signals
D. More than one of the above
E. None of the above

Subscribe Infeepedia youtube channel for computer science competitive exams


Download Infeepedia app and call or wapp on 8004391758
Computer Networks Infeepedia By: Infee Tripathi
100. Which of the following is NOT an error detection 107. Which protocol is used for real-time communication at the
technique? transport layer?
A. CRC A. TCP
B. Checksum B. UDP
C. Hamming Code C. SCTP
D. More than one of the above D. More than one of the above
E. None of the above E. None of the above

101. Which protocol is responsible for logical 108. Which sublayer handles access to the physical medium?
addressing in the network layer? A. LLC
A. IP B. MAC
B. ARP C. Transport
C. ICMP D. More than one of the above
D. More than one of the above E. None of the above
E. None of the above
109. Which protocol is used for connectionless communication
102. Which protocol is used to map IP addresses to
at the transport layer?
MAC addresses?
A. TCP
A. ICMP
B. UDP
B. ARP
C. SCTP
C. RARP
D. More than one of the above
D. More than one of the above
E. None of the above
E. None of the above

103. Which protocol provides error reporting and 110. Which sublayer of the data link layer is responsible for error
diagnostics at the network layer? detection?
A. IP A. LLC
B. ICMP B. MAC
C. OSPF C. Network
D. More than one of the above D. More than one of the above
E. None of the above E. None of the above

104. Which protocol is used for routing within an 111. Which protocol is responsible for logical addressing in the
autonomous system? network layer?
A. RIP A. IP
B. OSPF B. ARP
C. BGP C. ICMP
D. More than one of the above D. More than one of the above
E. None of the above E. None of the above
105. Which protocol is used to route multicast traffic? 112. Which protocol is used to map IP addresses to MAC
A. IGMP addresses?
B. PIM A. ICMP
C. RIP B. ARP
D. More than one of the above C. RARP
E. None of the above D. More than one of the above
106. Which protocol provides reliable communication E. None of the above
at the transport layer?
A. UDP
B. TCP
C. ICMP
D. More than one of the above
E. None of the above
Subscribe Infeepedia youtube channel for computer science competitive exams
Download Infeepedia app and call or wapp on 8004391758
Computer Networks Infeepedia By: Infee Tripathi
113. Which protocol provides error reporting and
diagnostics at the network layer?
A. IP
B. ICMP
C. OSPF
D. More than one of the above
E. None of the above

114. Which protocol is used for downloading emails


from a mail server to a local client?
A. SMTP
B. POP3
C. IMAP
D. More than one of the above
E. None of the above

115. Which protocol is used to route multicast traffic?


A. IGMP
B. PIM
C. RIP
D. More than one of the above
E. None of the above

Subscribe Infeepedia youtube channel for computer science competitive exams


Download Infeepedia app and call or wapp on 8004391758
Computer Networks Infeepedia By: Infee Tripathi
Answer With Explanation
1. Answer: C. LAN 9. Answer: B. Wireless Local Area Network
Explanation: A Local Area Network (LAN) is designed for Explanation: A WLAN is a type of LAN that uses wireless
small geographical areas, such as a building or campus. It communication technology, such as Wi-Fi, to connect
enables high-speed communication and resource sharing devices. It provides the flexibility of mobility within a
within a limited space. Unlike WANs and MANs, LANs are limited area while maintaining network connectivity.
typically privately owned and operated.
10. Answer: A. Intranet
2. Answer: B. MAN Explanation: An Intranet is a private network used within
Explanation: A Metropolitan Area Network (MAN) covers a an organization to share information and resources
city or large campus, providing connectivity over a larger securely. It is typically isolated from external access,
area than LAN but smaller than WAN. MANs often use unlike the Internet.
high-speed technologies like fiber optics to interconnect
various LANs within a metropolitan region. 11. Answer: B. Extranet allows limited external access
Explanation: An Extranet is an extension of an Intranet
3. Answer: B. DNS that provides secure access to external users, such as
Explanation: The Domain Name System (DNS) is business partners or clients. It is designed to facilitate
responsible for converting human-readable domain names collaboration while maintaining security protocols.
(e.g., www.example.com) into machine-readable IP
addresses. ARP maps IP addresses to MAC addresses, and 12. Answer: B. Ring
DHCP assigns IP addresses dynamically. DNS is critical for Explanation: In a Ring topology, each device is connected
the functioning of the Internet, enabling user-friendly to exactly two other devices, forming a circular data
addressing. path. Data travels in one direction, reducing collisions
4. Answer: B. PAN but making the network vulnerable to a single point of
Explanation: A Personal Area Network (PAN) is a small failure.
network used for connecting personal devices like
smartphones, tablets, and laptops within a short range, 13. Answer: D. More than one of the above
typically up to 10 meters. Bluetooth and Infrared Explanation: FTP (File Transfer Protocol) is widely used
technologies are common in PANs. for transferring files over a network. TFTP (Trivial File
Transfer Protocol) is a simplified version of FTP that does
5. Answer: A. CAN not require authentication. SCP (Secure Copy Protocol) is
Explanation: A Campus Area Network (CAN) interconnects used for secure file transfers using SSH. All these
multiple LANs within a specific campus, such as a protocols are designed for file transfer but differ in
university or corporate office. It is smaller than a MAN and complexity and security.
typically uses high-speed connections to provide efficient
communication. 14. Answer: A. Mesh
Explanation: A Mesh topology connects devices in such a
6. Answer: D. More than one of the above way that multiple paths exist for data transmission. This
Explanation: SAN can refer to both Storage Area Network ensures high reliability and fault tolerance, as data can
and System Area Network. A Storage Area Network is used take alternate routes if one path fails.
for block-level data storage, while a System Area Network
connects high-performance computing resources. 15. Answer: B. SMTP
7. Answer: B. HAN Explanation: The Simple Mail Transfer Protocol (SMTP) is
Explanation: A Home Area Network (HAN) connects used for sending emails. It operates at the application
devices within a home, such as smart appliances, security layer and facilitates the transmission of messages
systems, and personal computers. It enables centralized between email servers. SMTP uses a client-server model
control and communication among these devices. and often works alongside POP3 or IMAP for retrieving
8. Answer: A. VPN emails. HTTP is for web browsing, and FTP is for file
Explanation: A Virtual Private Network (VPN) creates a transfer. SMTP ensures reliable delivery of emails
secure, encrypted connection over a public network like through a series of commands and responses between
the internet. It is commonly used for remote access and mail servers.
protecting sensitive data during transmission.
Subscribe Infeepedia youtube channel for computer science competitive exams
Download Infeepedia app and call or wapp on 8004391758
Computer Networks Infeepedia By: Infee Tripathi
16. Answer: B. Bus 23. Answer: D. More than one of the above
Explanation: In a Bus topology, all devices are connected Explanation: Both HAN (Home Area Network) and WLAN
to a single communication line or cable. This topology is (Wireless Local Area Network) are used to connect IoT
cost-effective due to minimal cabling and is suitable for devices in homes. HAN focuses on smart appliances and
small networks. However, it may face performance issues automation, while WLAN provides wireless connectivity.
as the network grows.
24. Answer: B. To allow external users limited access to an
17. Answer: A. HTTP organization's network
Explanation: Hypertext Transfer Protocol (HTTP) is the Explanation: An Extranet extends an organization's
foundation of data communication for the World Wide Intranet to external users, such as clients or partners,
Web. It is used to load web pages using hypertext links. providing controlled access to specific resources while
HTTP defines how messages are formatted and maintaining security.
transmitted, and how web servers and browsers should
respond to requests. FTP is used for file transfers, and 25. Answer: B. Hybrid
Telnet is used for terminal emulation. Explanation: A Hybrid topology integrates features of
18. Answer: C. Devices have multiple connections to other multiple topologies, such as Star and Bus. It offers
devices flexibility and scalability, making it suitable for complex
Explanation: In a Mesh topology, each device is connected networks.
to multiple other devices, ensuring high redundancy and
reliability. This topology is ideal for critical networks 26. Answer: D. More than one of the above
where downtime is unacceptable. Explanation: RTP (Real-Time Protocol) and SIP (Session
Initiation Protocol) are critical for voice and video
19. Answer: A. SAN communication over IP networks. RTP handles the
Explanation: A Storage Area Network (SAN) is designed for transport of audio and video streams, while SIP manages
block-level data storage. It connects storage devices like the signaling for establishing, maintaining, and
disk arrays and tape libraries to servers, ensuring high- terminating communication sessions. VoIP (Voice over
speed and reliable access to data. IP) is an application of these protocols.

20. Answer: B. To secure communication over public 27. Answer: A. Enterprise Private Network
networks Explanation: An Enterprise Private Network (EPN) is a
Explanation: A Virtual Private Network (VPN) creates an private network used by organizations to securely
encrypted connection over a public network like the connect various branches and offices. It ensures efficient
Internet. It ensures data privacy and security, often used and secure communication across the enterprise.
for remote work and accessing restricted resources.
28. Answer: B. Mesh
21. Answer: A. Bus Explanation: Mesh topology is highly resilient because it
Explanation: In a Bus topology, a single communication provides multiple paths for data transmission. If one
line connects all devices, and terminators are required at node or connection fails, data can still be transmitted
both ends to prevent signal reflection. Without through alternate paths.
terminators, data transmission would be disrupted.
29. Answer: B. System Area Network
22. Answer: D. More than one of the above
Explanation: A System Area Network (SAN) connects
Explanation: HTTPS (Hypertext Transfer Protocol Secure) is
high-performance computing nodes in a cluster,
HTTP combined with encryption provided by TLS
providing low-latency and high-bandwidth
(Transport Layer Security). TLS ensures data integrity and
communication. It is commonly used in supercomputing
confidentiality over the network. SSH (Secure Shell) is not
environments.
for web communication but provides secure remote
access. Both HTTPS and TLS contribute to secure
communication in web applications.

Subscribe Infeepedia youtube channel for computer science competitive exams


Download Infeepedia app and call or wapp on 8004391758
Computer Networks Infeepedia By: Infee Tripathi
30. Answer: D. More than one of the above 37. Answer: C. Susceptible to crosstalk
Explanation: IMAP (Internet Message Access Protocol) and Explanation: Fiber-optic cables are immune to crosstalk
POP3 (Post Office Protocol) are both used for retrieving and electromagnetic interference because they use light
emails from a server. IMAP allows users to manage emails to transmit data. They offer high bandwidth and are
directly on the server, enabling access from multiple made of glass or plastic, making them ideal for high-
devices. POP3 downloads emails to the local device and speed communication.
typically deletes them from the server. SMTP, on the other
hand, is used for sending emails. 38. Answer: A. SNMP
Explanation: A widely used protocol for managing and
31. Answer: B. Half-duplex monitoring network devices on a (LAN) or (WAN). ICMP
Explanation: Half-duplex transmission allows data to flow is used for error handling and network diagnostics. The
in both directions, but only one direction at a time. For Teletype Network Protocol is used to provide a
example, a walkie-talkie works in half-duplex mode, command line interface for communication with a
where one person speaks while the other listens. Simplex remote device or server.
allows data flow in one direction only, while full-duplex
enables simultaneous two-way communication. 39. Answer: B. Digital signals are discrete, while analog
signals are continuous.
32. Answer: D. Radio waves Explanation: Analog signals represent data with
Explanation: Guided transmission media involves physical continuous waveforms, while digital signals use discrete
pathways like cables (e.g., coaxial, twisted-pair, and fiber- binary values (0s and 1s). Digital signals are more
optic). Radio waves are part of unguided media, where immune to noise compared to analog signals.
signals travel through the air without a physical conductor.
40. Answer: B. Packet switching
33. Answer: A. Analog signal Explanation: The Internet relies on packet switching,
Explanation: Traditional telephony systems rely on analog where data is divided into packets and transmitted
signals to transmit voice data. Analog signals vary independently. This technique is efficient and robust,
continuously over time. Modern telephony, however, allowing multiple devices to share the network
often uses digital signals for enhanced quality and simultaneously.
reliability.
41. Answer: B. Repeater
34. Answer: B. Switch Explanation: Repeaters regenerate and amplify signals to
Explanation: Switches operate at the Data Link layer (Layer extend the range of a network. They operate at the
2) of the OSI model, forwarding data based on MAC Physical layer of the OSI model. Hubs do not amplify
addresses. Routers operate at the Network layer (Layer 3), signals but act as basic connection points.
and hubs are physical layer devices 42. Answer: C. Fiber-optic cable
Explanation: Fiber-optic cables are ideal for long-distance
35. Answer: A. Circuit switching communication due to their low signal attenuation and
Explanation: Circuit switching establishes a dedicated immunity to electromagnetic interference. Twisted-pair
communication path for the duration of a session, and coaxial cables are more prone to signal loss over
ensuring consistent bandwidth and latency. Packet long distances.
switching divides data into packets, while message
switching sends the entire message without a dedicated 43. Answer: A. Twisted-pair cable
path. Explanation: Twisted-pair cables, commonly used in local
area networks (LANs), are more susceptible to
36. Answer: C. Full-duplex electromagnetic interference compared to coaxial and
Explanation: Full-duplex transmission allows simultaneous fiber-optic cables. Shielded twisted-pair (STP) reduces
two-way communication, which is essential for this vulnerability but not completely.
applications like video conferencing. It ensures real-time 44. Answer: B. Bridge
interaction without delays caused by switching directions. Explanation: A bridge connects two LAN segments and
uses MAC addresses to filter and forward traffic. It
operates at the Data Link layer (Layer 2) of the OSI
model. Repeaters and hubs operate at the Physical layer.
Subscribe Infeepedia youtube channel for computer science competitive exams
Download Infeepedia app and call or wapp on 8004391758
Computer Networks Infeepedia By: Infee Tripathi
45. Answer: B. Multiple signals are transmitted on different 52. Answer: A. Simplex
frequency bands. Explanation: Broadcasting a TV signal is a one-way
Explanation: FDM allows multiple signals to be communication process, making simplex mode the most
transmitted simultaneously by allocating separate suitable. The signal flows from the broadcaster to
frequency bands to each signal. It is commonly used in viewers without requiring a return path.
radio and television broadcasting. Time-division
multiplexing (TDM) uses time slots instead of frequency 53. Answer: A. Router
bands. Explanation: Routers operate at the Network layer (Layer
3) of the OSI model, making routing decisions based on
46. Answer: C. Message switching IP addresses. Switches and bridges operate at the Data
Explanation: In message switching, the entire message is Link layer (Layer 2).
stored at intermediate nodes before being forwarded to
the next node. This technique can cause delays but 54. Answer: A. Circuit switching
ensures reliable delivery. Circuit switching and packet Explanation: Circuit switching provides a dedicated path
switching do not use this approach. for the duration of the communication session, ensuring
consistent bandwidth and low latency, which are
47. Answer: B. Inefficient use of bandwidth essential for real-time voice and video communication.
Explanation: Circuit switching establishes a dedicated path
between sender and receiver for the entire session, even if 55. Answer: C. Wavelength-division multiplexing (WDM)
no data is being transmitted. This leads to inefficient Explanation: WDM is a type of multiplexing used in
bandwidth utilization. However, it ensures a consistent optical fiber communication, where multiple signals are
connection with low latency, making it suitable for real- transmitted simultaneously on different wavelengths of
time applications like voice calls. light. This technique maximizes the utilization of fiber-
optic cables.
48. Answer: A. High susceptibility to interference
Explanation: Unguided transmission media, such as radio 56. Answer: D. More than one of the above
waves, are prone to electromagnetic interference and Explanation: Both hubs and switches can serve as central
weather conditions. Despite offering mobility and ease of connection points in a star topology. Hubs are simpler
installation, interference can degrade signal quality and devices that broadcast data to all ports, while switches
reliability. intelligently forward data to the intended recipient.

49. Answer: B. Continuous waveform 57. Answer: B. Noise resistance


Explanation: Digital signals are represented by discrete Explanation: Digital signals are less susceptible to noise
binary values (0s and 1s) and are resistant to noise. and can be easily regenerated using repeaters, making
Continuous waveforms are a characteristic of analog them suitable for long-distance communication. Analog
signals, which vary smoothly over time. signals, on the other hand, degrade more significantly
over distance.
50. Answer: B. Switch
Explanation: A switch divides a network into multiple 58. Answer: C. They are continuous waveforms.
collision domains, reducing the likelihood of data Explanation: Analog signals are represented by
collisions. Each port on a switch represents a separate continuous waveforms that vary over time. They are
collision domain. Routers divide networks into separate more affected by noise compared to digital signals,
broadcast domains, while hubs do not segment collision which use discrete binary values.
domains.
59. Answer: C. Message switching
51. Answer: B. Packet switching Explanation: Message switching stores and forwards the
Explanation: Packet switching divides data into packets, entire message at intermediate nodes, ensuring reliable
which are transmitted independently and may take delivery of large files. However, this technique may
different routes to the destination. This technique is introduce delays, making it less suitable for real-time
efficient and fault-tolerant, as it does not rely on a communication.
dedicated path like circuit switching.

Subscribe Infeepedia youtube channel for computer science competitive exams


Download Infeepedia app and call or wapp on 8004391758
Computer Networks Infeepedia By: Infee Tripathi
60. Answer: D. More than one of the above 67. Answer: B. Connect networks using different protocols
Explanation: Packet switching divides data into packets, Explanation: Gateways operate at multiple OSI layers
which are transmitted independently. While it is efficient and connect networks using different communication
and fault-tolerant, it may introduce latency, making it less protocols. They perform protocol conversion, allowing
ideal for real-time applications compared to circuit devices on dissimilar networks to communicate.
switching. Switches connect devices within a LAN, and firewalls
filter traffic.
61. Answer: B. Data Link Layer
Explanation: The Data Link Layer handles error detection 68. Answer: A. Transport Layer
and correction through mechanisms like checksums and Explanation: The Transport Layer (Layer 4) manages flow
CRC (Cyclic Redundancy Check). It ensures reliable data control, segmentation, and reassembly of data for
transfer between adjacent nodes. The Transport Layer reliable communication. It uses protocols like TCP and
handles end-to-end error control but does not perform UDP. The Data Link Layer handles flow control for local
physical error correction. links, but segmentation is not its responsibility.

62. Answer: B. Session Layer 69. Answer: A. Repeater


Explanation: The Session Layer (Layer 5) establishes, Explanation: Repeaters operate at the Physical Layer
manages, and terminates communication sessions (Layer 1) by amplifying and retransmitting signals to
between applications. It synchronizes data streams and extend the range of a network. They do not interpret
ensures proper session handling in case of interruptions. data. Routers operate at the Network Layer, and
The Transport Layer deals with data delivery, and the firewalls operate at higher layers.
Presentation Layer focuses on data formatting.
70. Answer: A. Transport Layer
63. Answer: B. Router Explanation: The Transport Layer (Layer 4) ensures data
Explanation: Routers operate at the Network Layer (Layer integrity and reliable communication through error
3) and connect multiple networks. They determine the detection, retransmission, and acknowledgment
best path for data packets using routing tables and mechanisms. Protocols like TCP provide reliable data
protocols. Switches connect devices within the same delivery, while UDP offers faster but less reliable
network, while gateways can translate between different communication.
network protocols.
71. Answer: D. More than one of the above
64. Answer: B. Presentation Layer Explanation: Protocols like HTTP (for web
Explanation: The Presentation Layer (Layer 6) ensures that communication), FTP (for file transfer), and SMTP (for
data is in a compatible format for transmission. It handles email) operate at the Application Layer (Layer 7). This
encryption, compression, and translation of data. The layer provides services directly to end-users and
Application Layer focuses on user interaction, while the applications.
Transport Layer manages data delivery.
72. Answer: B. Network connectivity
65. Answer: A. Firewall
Explanation: NICs enable devices to connect to a
Explanation: Firewalls filter network traffic based on
network by providing a physical and logical interface.
predefined security rules, operating at multiple OSI layers,
They operate at both the Physical Layer (Layer 1) and the
including the Transport and Application Layers. NICs
Data Link Layer (Layer 2). NICs handle MAC addressing
(Network Interface Cards) facilitate network connectivity,
and enable communication over wired or wireless
and modems convert signals for internet access but do not
media.
provide traffic filtering.

66. Answer: B. Network Layer 73. Answer: B. Presentation Layer


Explanation: The Network Layer (Layer 3) is responsible for Explanation: The Presentation Layer (Layer 6) handles
routing and forwarding data packets between devices data compression and encryption to ensure secure and
across different networks. It uses logical addressing (IP efficient data transmission. It transforms data into a
addresses) and routing protocols like OSPF and BGP. The format suitable for the Application Layer, facilitating
Transport Layer ensures reliable data delivery, while the compatibility between different systems.
Data Link Layer handles local network data transfer.
Subscribe Infeepedia youtube channel for computer science competitive exams
Download Infeepedia app and call or wapp on 8004391758
Computer Networks Infeepedia By: Infee Tripathi
74. Answer: B. Physical Layer 82. Answer: B. Packet filtering
Explanation: The Physical Layer (Layer 1) converts data Explanation: Firewalls filter packets based on predefined
into electrical, optical, or radio signals for transmission security rules, preventing unauthorized access. They
over physical media. It defines hardware specifications, operate at multiple OSI layers, including the Network
such as cables, connectors, and transmission rates. and Transport Layers, to ensure secure data
communication.
75. Answer: A. Gateway
Explanation: Gateways operate at multiple OSI layers, 83. Answer: B. Physical Layer
often from the Application Layer down to the Network Explanation: The Physical Layer (Layer 1) defines the
Layer. They translate communication protocols, data hardware specifications, such as cables, connectors, and
formats, or address schemes to enable communication voltage levels, for transmitting raw bits over the
between dissimilar networks. network medium.

76. Answer: B. Network Layer 84. Answer: A. Application Layer


Explanation: The Network Layer (Layer 3) is responsible for Explanation: The Application Layer (Layer 7) provides
packet forwarding and routing. It determines the best network services directly to the end-user. Protocols like
path for data packets using protocols like IP, OSPF, and HTTP, FTP, SMTP, and Telnet enable tasks such as email
BGP. It also handles logical addressing through IP communication, file transfer, and remote system access.
addresses. The Presentation Layer handles data formatting, and the
Session Layer manages sessions.
77. Answer: B. Synchronization of communication
Explanation: The Session Layer (Layer 5) manages sessions 85. Answer: A. Physical Layer
between applications. It establishes, maintains, and Explanation: A modem operates at the Physical Layer
terminates communication sessions and synchronizes data (Layer 1), converting digital signals into analog signals
streams to ensure a smooth flow of information. (and vice versa) for transmission over telephone lines or
other media. It does not interpret or route data, which is
78. Answer: A. Data Link Layer handled by higher layers.
Explanation: The Data Link Layer (Layer 2) is responsible
for framing, physical addressing (MAC addresses), and 86. Answer: B. Network Layer
error detection. It ensures reliable data transfer between Explanation: The Network Layer (Layer 3) uses logical
nodes on the same network segment. addressing (IP addresses) to identify devices and
determine the best path for data transmission. Routing
79. Answer: B. Transport Layer protocols like OSPF and BGP enable efficient packet
Explanation: The Transport Layer (Layer 4) ensures end-to- forwarding across interconnected networks.
end delivery of data by managing error detection, flow
control, and retransmissions. It uses protocols like TCP for 87. Answer: B. Access Point
reliable communication and UDP for faster, connectionless Explanation: An Access Point (AP) acts as a central hub
communication. for wireless devices, enabling them to connect to a
wired network. It operates at the Data Link Layer (Layer
80. Answer: A. Gateway 2) and uses Wi-Fi protocols to facilitate communication
Explanation: Gateways can operate at the Application between wireless and wired devices.
Layer (Layer 7) by translating protocols and data formats
between networks. Firewalls operate at higher layers for 88. Answer: B. Transport Layer
traffic filtering, while modems work at the Physical Layer. Explanation: The Transport Layer (Layer 4) breaks data
into smaller segments for transmission. It ensures
81. Answer: B. Data Link Layer reliable delivery through error detection and
Explanation: The Data Link Layer (Layer 2) detects and retransmission mechanisms. The Network Layer handles
corrects transmission errors using techniques like CRC. It routing, while the Data Link Layer focuses on framing
ensures reliable communication over physical links, while and local data transfer.
the Physical Layer handles raw data transmission.

Subscribe Infeepedia youtube channel for computer science competitive exams


Download Infeepedia app and call or wapp on 8004391758
Computer Networks Infeepedia By: Infee Tripathi
89. Answer: A. Enables network connectivity 96. Answer: B. Reed-Solomon Code
Explanation: A NIC is a hardware component that connects Explanation: Reed-Solomon Code is an error correction
a device to a network. It operates at the Physical and Data technique designed to correct burst errors, commonly
Link layers of the OSI model, handling MAC addressing and used in CDs, DVDs, and QR codes. It works by adding
enabling communication over wired or wireless networks. redundant data to ensure the recovery of original data
NICs do not perform encryption or error correction even if a part is corrupted.
directly, as these functions are handled by higher layers or
other components. 97. Answer: A. Error detection
Explanation: A checksum is used for error detection by
90. Answer: A. Packet filtering calculating the sum of data segments and appending it
Explanation: A firewall acts as a security barrier, filtering to the data. The receiver recalculates the checksum and
incoming and outgoing network traffic based on compares it with the transmitted one to detect errors.
predefined rules. It operates at the Network and Transport 98. Answer: B. CRC
layers, inspecting packets for malicious content or Explanation: CRC is highly effective for detecting burst
unauthorized access. Signal amplification and data errors due to its polynomial division method. It can
compression are not firewall functions. detect multiple bit errors within a block of data, making
it more robust than parity checks or checksums.
91. Answer: C. Parity Check
Explanation: Parity Check is a simple error detection 99. Answer: B. Prevention of unauthorized access
method where a parity bit is added to the data. It ensures Explanation: Firewalls enhance network security by
the total number of 1s in the data is either even (even blocking unauthorized access and filtering traffic based
parity) or odd (odd parity). While effective for single-bit on predefined rules. They do not compress data or
errors, it cannot detect multiple-bit errors. amplify signals, as these are unrelated functions.

92. Answer: A. Hamming Code 100. Answer: C. Hamming Code


Explanation: Hamming Code is an error correction Explanation: Hamming Code is an error correction
technique that adds redundant bits to data, enabling the technique, not an error detection method. CRC and
detection and correction of single-bit errors. It uses parity Checksum are used for detecting errors during data
bits at specific positions to determine the location of the transmission.
error and correct it.
101. Answer: A. IP
93. Answer: B. Define permissions for resources Explanation: The Internet Protocol (IP) is the primary
Explanation: ACLs specify which users or devices have protocol at the network layer, responsible for logical
access to specific resources, such as files or network addressing and routing packets between devices. It
segments. They are a key component of access control ensures that data packets are delivered to the correct
systems, ensuring only authorized entities can access or destination using IP addresses. ARP resolves MAC
modify data. Authentication and encryption are separate addresses, and ICMP handles error reporting and
processes. diagnostics.

94. Answer: D. More than one of the above 102. Answer: B. ARP
Explanation: Both CRC (Cyclic Redundancy Check) and Explanation:The Address Resolution Protocol (ARP)
Checksum are error detection techniques. CRC uses maps IP addresses to MAC addresses in a local
polynomial division to detect errors, while Checksum network. It ensures that packets sent at the network
calculates the sum of data segments. Hamming Code, on layer reach the correct device at the data link layer.
the other hand, is an error correction technique. RARP performs the reverse operation, mapping MAC
addresses to IP addresses.
95. Answer: B. Blocks unauthorized access
Explanation: Firewalls block unauthorized access to a
network by filtering traffic based on predefined rules.
They operate at multiple layers, primarily the Network
and Transport layers. They do not amplify signals or
operate at the Physical Layer.
Subscribe Infeepedia youtube channel for computer science competitive exams
Download Infeepedia app and call or wapp on 8004391758
Computer Networks Infeepedia By: Infee Tripathi
103. Answer: B. ICMP 110. Answer: B. LLC
Explanation: The Internet Control Message Protocol Explanation: The LLC (Logical Link Control) sublayer
(ICMP) is used for error reporting and network handles error detection and correction through
diagnostics. For example, it is used in the "ping" techniques like CRC (Cyclic Redundancy Check), flow
command to check connectivity. OSPF is a routing control and logical addressing. Network is not a data
protocol, and IP is used for addressing and routing but link sublayer.
does not handle diagnostics.
111. Answer: A. IP
104. Answer: D. More than one of the above Explanation:The Internet Protocol (IP) is the primary
Explanation: Both RIP (Routing Information Protocol) and protocol at the network layer, responsible for logical
OSPF (Open Shortest Path First) are used for routing addressing and routing packets between devices. It
within an autonomous system. RIP uses distance-vector ensures that data packets are delivered to the correct
routing, while OSPF uses link-state routing. BGP (Border destination using IP addresses. ARP resolves MAC
Gateway Protocol) is used for routing between addresses, and ICMP handles error reporting and
autonomous systems. diagnostics.

105. Answer: D. More than one of the above 112. Answer: B. ARP
Explanation: IGMP (Internet Group Management Explanation: The Address Resolution Protocol (ARP)
Protocol) manages multicast group memberships, while maps IP addresses to MAC addresses in a local
PIM (Protocol Independent Multicast) routes multicast network. It ensures that packets sent at the network
traffic efficiently. RIP is unrelated to multicast, as it is layer reach the correct device at the data link layer.
used for unicast routing. RARP performs the reverse operation, mapping MAC
addresses to IP addresses.
106 Answer: B. TCP
Explanation: The Transmission Control Protocol (TCP) 113. Answer: B. ICMP
ensures reliable communication through mechanisms like Explanation: The Internet Control Message Protocol
acknowledgment, retransmission, and flow control. UDP (ICMP) is used for error reporting and network
(User Datagram Protocol) is connectionless and does not diagnostics. For example, it is used in the "ping"
guarantee reliability. ICMP operates at the network layer command to check connectivity. OSPF is a routing
for error reporting. protocol, and IP is used for addressing and routing but
does not handle diagnostics.
107. Answer: D. More than one of the above
Explanation: UDP and SCTP (Stream Control Transmission 114. Answer: B. POP3
Protocol) are used for real-time communication. UDP is Explanation: POP3 (Post Office Protocol) used for
lightweight and suitable for latency-sensitive applications downloading emails. POP3 downloads emails to the
like VoIP. SCTP combines features of TCP and UDP, client and deletes them from the server, while IMAP
providing reliability for multimedia and signaling. synchronizes emails across devices. SMTP is used for
sending emails.
108. Answer: B. MAC
Explanation: The MAC sublayer manages access to the 115. Answer: b. PIM
physical medium, ensuring that multiple devices can Explanation: IGMP (Internet Group Management
share the same channel without collisions. LLC operates Protocol) manages multicast group memberships, while
above MAC, handling logical connections. Transport is a PIM (Protocol Independent Multicast) routes multicast
higher-layer function. traffic efficiently. RIP is unrelated to multicast, as it is
used for unicast routing.
109. Answer: B. UDP
Explanation: UDP (User Datagram Protocol) is a
connectionless protocol that sends data without
establishing a connection. It is lightweight and suitable
for applications like DNS queries and video streaming.
TCP and SCTP are connection-oriented.

Subscribe Infeepedia youtube channel for computer science competitive exams


Download Infeepedia app and call or wapp on 8004391758
Computer Networks Infeepedia By: Infee Tripathi

Subscribe Infeepedia youtube channel for computer science competitive exams


Download Infeepedia app and call or wapp on 8004391758

You might also like