set-1
1. ______ is not true in case of OSI and TCP/IP model.
- The OSI Model is a logical and conceptual model that defines how communication needs to be done
- TCP/IP model depends on standard protocols that assigns the network of hosts over the Internet.
- Both OSI and TCP/IP models are protocol independent
- None of these
Show me the answer
Answer: 3. Both OSI and TCP/IP models are protocol independent
Explanation:
- The OSI model is a conceptual framework, while the TCP/IP model is based on standard protocols. The OSI model is protocol-independent, but the TCP/IP model is protocol-dependent.
2. A computer has just been installed on the Ethernet LAN but it is not communicating with the network, then what should be done at first?
- Update the NIC driver
- Verify the IP address configuration on the workstation
- Verify the connectivity on the computer’s network card
- All of the above
Show me the answer
Answer: 2. Verify the IP address configuration on the workstation
Explanation:
- The first step in troubleshooting network connectivity issues is to verify the IP address configuration, as incorrect settings can prevent communication.
3. Which of the following commands is not used in the troubleshooting of computer networks?
- Ping
- Tracert
- Ipconfig
- Chkdsk
Show me the answer
Answer: 4. Chkdsk
Explanation:
- Chkdsk is a command used to check the file system and disk for errors, not for network troubleshooting.
4. In network troubleshooting, which of the following commands is used?
- Netstat
- Nslookup
- Tracert
- All of the above
Show me the answer
Answer: 4. All of the above
Explanation:
- Netstat, Nslookup, and Tracert are all commonly used commands for network troubleshooting.
5. Which server maintains a directory of domain names and translate them to Internet Protocol (IP) addresses.
- DNS Server
- DHCP Server
- Web Server
- Database Server
Show me the answer
Answer: 1. DNS Server
Explanation:
- The DNS (Domain Name System) server is responsible for translating domain names into IP addresses.
6. Which data link sub-layer carries out data link functions that depend upon the type of medium?
- Logical link control
- Media access control
- Network interface control
- Error Control
Show me the answer
Answer: 2. Media access control
Explanation:
- The Media Access Control (MAC) sub-layer is responsible for controlling access to the physical medium.
7. When connected to the Internet, the device used to perform modulation and demodulation is called
- Trans receiver
- Modem
- Repeater
- All of the above
Show me the answer
Answer: 2. Modem
Explanation:
- A modem (modulator-demodulator) is used to convert digital data to analog signals for transmission over telephone lines and vice versa.
8. An web-site is a collection of
- Components of internet
- Web-pages
- Web links
- All of the above
Show me the answer
Answer: 2. Web-pages
Explanation:
- A website is a collection of web pages that are linked together and hosted on a web server.
9. In web applications, ______ is the correct order to form URLs.
- Protocol name, File name, DNS name
- DNS name, Protocol name, File name
- Protocol name, DNS name, File name
- Protocol name, File name, DNS name
Show me the answer
Answer: 3. Protocol name, DNS name, File name
Explanation:
- The correct order for forming URLs is Protocol name (e.g., http), DNS name (e.g., www.example.com ), and File name (e.g., index.html).
10. In computer networking, MAN lies in between LAN and WAN in terms of
- Area coverage
- Data transfer rate
- Both of the above
- None of these
Show me the answer
Answer: 3. Both of the above
Explanation:
- A Metropolitan Area Network (MAN) covers a larger area than a Local Area Network (LAN) but smaller than a Wide Area Network (WAN), and it typically offers higher data transfer rates than a WAN.
11. Which type of network is an Internet?
- LAN
- MAN
- WAN
- All of the above
Show me the answer
Answer: 3. WAN
Explanation:
- The Internet is a global network, which falls under the category of a Wide Area Network (WAN).
12. The most commonly used network media for small local area network is ______.
- Twisted pair cable
- Co-axial cable
- Optical fiber
- All of the above
Show me the answer
Answer: 1. Twisted pair cable
Explanation:
- Twisted pair cables are widely used in small local area networks (LANs) due to their cost-effectiveness and ease of installation.
13. In computer networking, a Network Interface Card (NIC) has
- MAC address
- IP address
- Subnet mask
- All of the above
Show me the answer
Answer: 1. MAC address
Explanation:
- A Network Interface Card (NIC) has a unique MAC (Media Access Control) address, which is used for identification on the network.
14. Which statement is true in case of IP address?
- Every computer connected to the network must have an IP address to communicate.
- Every computer connected to the Internet must have an IP address to communicate.
- Both of the above
- None of these
Show me the answer
Answer: 3. Both of the above
Explanation:
- An IP address is required for any device to communicate on a network or the Internet.
15. Which of the following statement is false in case of IP
- IP is an Internet path
- Every computer must have an IP address
- IP is a unique address of a computer connected to the network
- Both A and B
Show me the answer
Answer: 4. Both A and B
Explanation:
- IP is not an “Internet path”; it is a unique address assigned to devices for communication. Not every computer must have an IP address if it is not connected to a network.
16. In computer networking, the commonly used topology for LAN is ______.
- Star topology
- Ring topology
- Bus topology
- Tree topology
Show me the answer
Answer: 1. Star topology
Explanation:
- The star topology is the most commonly used topology in LANs because it is easy to set up and manage.
17. In network security, which statement is true in case of IPS?
- IPS is a network security technology that examines network traffic flows to detect and prevent vulnerability exploits.
- If an attack is detected, IPS can stop the malicious traffic before it makes it to rest of the network.
- Both of the above
- None of these
Show me the answer
Answer: 3. Both of the above
Explanation:
- An Intrusion Prevention System (IPS) monitors network traffic for malicious activity and can take action to block or prevent attacks.
18. In network security, which statement is false in case of IPS and IDS?
- IDS is a device or software application that monitors a network or systems for malicious activity or policy violations.
- IPS controls access to IT networks in order to protect systems from attack and abuse.
- IDS are designed to identify suspicious attacks and to take the corrective action to block them.
- If an attack is detected, IPS can stop the malicious traffic before it makes it to rest of the network.
Show me the answer
Answer: 3. IDS are designed to identify suspicious attacks and to take the corrective action to block them.
Explanation:
- IDS (Intrusion Detection System) only detects and alerts about suspicious activity, while IPS (Intrusion Prevention System) can take action to block attacks.
19. Which statement is false in case of peer-to-peer network?
- In peer-to-peer networks all nodes are act as server as well as client.
- Peer-to-peer network is easier to setup.
- Peer-to-peer network is more expensive than client server network.
- Each workstation on the network shares its files equally with the others.
Show me the answer
Answer: 3. Peer-to-peer network is more expensive than client server network.
Explanation:
- Peer-to-peer networks are generally less expensive to set up and maintain compared to client-server networks.
20. In computer networking, most reliable network topology.
- Bus topology
- Mesh topology
- Tree topology
- None of these
Show me the answer
Answer: 2. Mesh topology
Explanation:
- Mesh topology is the most reliable because it provides multiple paths for data transmission, ensuring redundancy.
21. Which networking device can perform Network Address Translation (NAT)?
- Bridge
- Switch
- Router
- All of the above
Show me the answer
Answer: 3. Router
Explanation:
- Routers are capable of performing Network Address Translation (NAT), which allows multiple devices on a local network to share a single public IP address.
22. What is Data Encryption Standards (DES) used in network security?
- It is symmetric key cryptography
- It uses only one key for encryption and decryption
- It is asymmetric key cryptography
- Both A and B
Show me the answer
Answer: 4. Both A and B
Explanation:
- DES is a symmetric key cryptography algorithm, meaning it uses the same key for both encryption and decryption.
23. Which of the following statement is true in case of IP address and MAC address?
- Every network device must have IP address and MAC address to communicate.
- IP address is logical address and MAC address is physical address.
- IP address can be changed but MAC address can never be changed.
- All of the above
Show me the answer
Answer: 4. All of the above
Explanation:
- IP addresses are logical and can be changed, while MAC addresses are physical and generally fixed.
24. What type of communication media is used to develop internet backbone for a bigger and wider Information Highway in the country?
- Wireless microwave link
- Co-axial cable
- Optical fiber
- All of the above
Show me the answer
Answer: 3. Optical fiber
Explanation:
- Optical fiber is widely used for internet backbones due to its high bandwidth and long-distance capabilities.
25. In OSI reference mode, which layer takes care that the data is sent in such a way that the receiver will understand the data or information and will be able to use the data?
- Transport layer
- Session layer
- Presentation layer
- Application layer
Show me the answer
Answer: 3. Presentation layer
Explanation:
- The Presentation layer is responsible for translating data into a format that the application layer can understand.
26. Which protocol is preferred for the streaming applications that require constant data flow, bulk data and fastness than reliability?
- TCP
- UDP
- FTP
- ARP
Show me the answer
Answer: 2. UDP
Explanation:
- UDP (User Datagram Protocol) is preferred for streaming applications because it provides faster data transmission without the overhead of error checking and retransmission.
27. In HTTPS, the communication protocol is encrypted using…
- Application layer security
- Transport layer security
- Network layer security
- None of these
Show me the answer
Answer: 2. Transport layer security
Explanation:
- HTTPS uses SSL/TLS (Secure Sockets Layer/Transport Layer Security) to encrypt communication at the transport layer.
28. A malware which attempts to obtain sensitive information for malicious reasons, by disguising as a trustworthy entity is called…
- Trojan horse
- Phishing
- Logic bomb
- All of the above
Show me the answer
Answer: 2. Phishing
Explanation:
- Phishing is a type of malware attack where attackers disguise themselves as trustworthy entities to steal sensitive information.
29. Which of the following malware do not reproduce or replicate itself but is still destructive?
- Virus
- Trojan
- Worm
- Both B and C
Show me the answer
Answer: 2. Trojan
Explanation:
- A Trojan does not replicate itself but can still cause significant damage by providing unauthorized access to a system.
30. A network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules is called
- Router
- Switch
- Firewall
- None of these
Show me the answer
Answer: 3. Firewall
Explanation:
- A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predefined security rules.
31. In computer networks, ______ is categorized in the computer related threats.
- Phishing
- Spyware
- Trojan horse
- All of the above
Show me the answer
Answer: 4. All of the above
Explanation:
- Phishing, spyware, and Trojan horses are all types of computer-related threats.
32. A universe of network-accessible information where web resources are identified by URLs and accessible via the Internet is called______.
- Local Area Network (LAN)
- Wide Area Network (WAN)
- World Wide Web (WWW)
- Storage Area Network (SAN)
Show me the answer
Answer: 3. World Wide Web (WWW)
Explanation:
- The World Wide Web (WWW) is a system of interlinked hypertext documents accessed via the Internet.
33. In computer networking, ______ is not any network type.
- Metropolitan Area Network
- Public Area Network
- Wireless Local Area Network
- Personal Area Network
Show me the answer
Answer: 2. Public Area Network
Explanation:
- “Public Area Network” is not a recognized network type.
34. A private enterprise network which is designed to support an organization’s employees to communicate, collaborate and perform their roles in a secure manner is called…
- Internet
- Extranet
- Intranet
Show me the answer
Answer: 4. Intranet
Explanation:
- An intranet is a private network used within an organization to facilitate communication and collaboration.
35. Which computer related threat attempts to obtain sensitive information by disguising as a trustworthy entity?
- Virus
- Trojan
- Worms
- Phishing
Show me the answer
Answer: 4. Phishing
Explanation:
- Phishing attacks involve tricking users into revealing sensitive information by pretending to be a trustworthy entity.
36. In network communication, which medium has the highest data transmission speed?
- Optical Fiber
- Satellite
- Coaxial Cable
- Microwave Link
Show me the answer
Answer: 1. Optical Fiber
Explanation:
- Optical fiber has the highest data transmission speed due to its ability to carry large amounts of data over long distances with minimal loss.
37. Which statement is false in case of Digital Signature?
- A digital signature is a mathematical algorithm routinely used to validate the authenticity and integrity of a message, software or digital document.
- Digital signature provides far more inherent security than handwritten signature.
- Just like a handwritten signature, a digital signature is unique for every document.
- None of these
Show me the answer
Answer: 3. Just like a handwritten signature, a digital signature is unique for every document.
Explanation:
- A digital signature is unique to the sender and the document, but it is not the same as a handwritten signature.
38. In web applications, which security is applied in HTTPS?
- Application layer security
- Transport layer security
- Network layer security
- None of these
Show me the answer
Answer: 2. Transport layer security
Explanation:
- HTTPS uses SSL/TLS (Secure Sockets Layer/Transport Layer Security) to encrypt communication at the transport layer.
39. In Nepal, the prevailing law which deals with the issues relating to cybercrime is…
- Electronic Transaction Act, 2063
- Criminal Act, 2074
- Copyright Act, 2059
- Right to-Information Act, 2064
Show me the answer
Answer: 1. Electronic Transaction Act, 2063
Explanation:
- The Electronic Transaction Act, 2063, is the primary law in Nepal that deals with cybercrime and electronic transactions.
40. In OSI reference mode, which layer takes care that the data is sent in such a way that the receiver will understand the data or information and will be able to use the data?
- Transport layer
- Session layer
- Presentation layer
- Application layer
Show me the answer
Answer: 3. Presentation layer
Explanation:
- The Presentation layer is responsible for translating data into a format that the application layer can understand.
41. An ______ is a network security tool that continuously monitors a network for harmful activity and takes corrective action to block it.
- Intrusion Detection System (IDS)
- Intrusion Prevention System (IPS)
- Both of the above
- None of these
Show me the answer
Answer: 2. Intrusion Prevention System (IPS)
Explanation:
- An Intrusion Prevention System (IPS) actively monitors and blocks harmful activity on a network.
42. Which of the following statements is false in case of Denial of Services (DoS) and Distributed Denial of Services (DDoS) attacks?
- Both attacks overload a server, rendering a website or resource inaccessible to the intended users.
- DDoS attack is a DoS attack that floods a targeted resource with several computers or machines.
- DoS attack is faster as compared to DDoS.
- None of these
Show me the answer
Answer: 3. DoS attack is faster as compared to DDoS.
Explanation:
- DDoS attacks are typically more powerful and faster than DoS attacks because they involve multiple machines.
43. Which statement is false in case of Digital Signature?
- A digital signature is a mathematical algorithm routinely used to validate the authenticity and integrity of a message, software or digital document.
- Digital signature provides far more inherent security than handwritten signature.
- Digital signature, like handwritten signature, becomes unique for each document.
- None of these
Show me the answer
Answer: 3. Digital signature, like handwritten signature, becomes unique for each document.
Explanation:
- A digital signature is unique to the sender and the document, but it is not the same as a handwritten signature.
44. ___ command can be used to check network connectivity between the host and the server/host when troubleshooting computer networks?
- IPCONFIG
- PING
- TRACERT
- Both B and C
Show me the answer
Answer: 4. Both B and C
Explanation:
- Both PING and TRACERT are used to check network connectivity and diagnose network issues.
45. An ___ is a private network that provides controlled access to authorized customers, vendors, partners, or others outside the company.
- Internet
- Intranet
- Extranet
- All of the above
Show me the answer
Answer: 3. Extranet
Explanation:
- An extranet is a private network that allows controlled access to external users, such as customers or partners.
46. A network in which two or more PCs are linked together to share files and get access to common devices like printers, scanners is called
- Client – Server Network
- Peer to Peer Network
- Both of the above
- None of these
Show me the answer
Answer: 2. Peer to Peer Network
Explanation:
- In a peer-to-peer network, devices share resources directly without the need for a central server.
47. Which of the following is not a network device?
- Hub
- Bridge
- Router
- Tape Drive
Show me the answer
Answer: 4. Tape Drive
Explanation:
- A tape drive is a storage device and is not used for networking purposes.
48. A type of malicious code .which disguises itself as a desirable code or software but can take control of your computer is
- Virus
- Worms
- Trojan
- Phishing
Show me the answer
Answer: 3. Trojan
Explanation:
- A Trojan disguises itself as legitimate software but can take control of a computer and perform malicious actions.
49. A piece of code intentionally inserted into a software system that will cause malicious function when specified conditions are met is called
- Worm
- Torjan horse
- Logic bomb
- None of these
Show me the answer
Answer: 3. Logic bomb
Explanation:
- A logic bomb is a piece of code that executes a malicious function when certain conditions are met.
50. ___is not a valid subnet mask in computer networking.
- 255.0.255.0
- 255.255.255.248
- 255.255.248.0
- 255.0.0.0
Show me the answer
Answer: 1. 255.0.255.0
Explanation:
- A valid subnet mask must have contiguous 1s followed by contiguous 0s. 255.0.255.0 is not a valid subnet mask.