Q.1 Physical or logical arrangement of network is __________.
A. Topology
B. Routing
C. Networking
D. Controlling
Ans : Topology
Q.2 Which network topology requires a central controller or hub?
A. Star
B. Mesh
C. Ring
D. Bus
Ans : Star
Q.3 _______ topology requires a multipoint connection.
A. Star
B. Mesh
C. Ring
D. Bus
Ans : Bus
Q.4 Data communication system spanning states, countries, or the whole world is ________.
A. LAN
B. WAN
C. MAN
D. PAN
Ans : WAN
Q.5 Data communication system within a building or campus is________.
A. LAN
B. WAN
C. MAN
D. PAN
Ans : LAN
Q.6 WAN stands for __________.
A. World area network
B. Wide area network
C. Web area network
D. Web access network
Ans : Wide area network
Q.7 In TDM, slots are further divided into __________.
A. Seconds
B. Frames
C. Packets
D. Bits
Ans : Frames
Q.8 _____ is the multiplexing technique that shifts each signal to a different carrier frequency.
A. FDM
B. TDM
C. Both FDM & TDM
D. PDM
Ans : FDM
Q.9 The attacker using a network of compromised devices is known as _____________.
A. Internet
B. Botnet
C. Telnet
D. D-net
Ans : Botnet
Q.10 Which of the following is a form of DoS attack?
A. Vulnerability attack
B. Bandwidth flooding
C. Connection flooding
D. All of the above
Ans : All of the above
Q.11 The DoS attack, in which the attacker establishes a large number of half-open or fully open TCP connections at the target host is ________.
A. Vulnerability attack
B. Bandwidth flooding
C. Connection flooding
D. UDP flooding
Ans : Connection flooding
Q.12 The DoS attack, in which the attacker sends deluge of packets to the targeted host is ________.
A. Vulnerability attack
B. Bandwidth flooding
C. Connection flooding
D. UDP flooding
Ans : Bandwidth flooding
Q.13 Packet sniffers involve ____________.
A. Active receiver
B. Passive receiver
C. Legal receiver
D. Partially-active receiver
Ans : Passive receiver
Q.14 Sniffers can be prevented by using _______________.
A. Wired environment
B. WiFi
C. Ethernet LAN
D. Switched network
Ans : Switched network
Q.15 Firewalls are often configured to block ___________.
A. UDP traffic
B. TCP traffic
C. Sensitive traffic
D. Best-effort traffic
Ans : UDP traffic
Q.16 In a network, If P is the only packet being transmitted and there was no earlier transmission, which of the following delays could be zero?
A. Propagation delay
B. Queuing delay
C. Transmission delay
D. Processing delay
Ans : Queuing delay