Computer Network MCQs by General knowledge Solutions
Computer Network MCQs by General knowledge Solutions
1. Sniffers can be deployed in
a) Wired environment
b) WiFi
c) Ethernet LAN
d) All of the mentioned View Answer
Answer: d Explanation: None.
2. Firewalls are often configured to block
a) UDP traffic
b) TCP traffic
c) Both of the mentioned
d) None of the mentioned View Answer
Answer: a Explanation: None.
3. IPSec is designed to provide the security at the
a) transport layer
b) network layer
c) application layer
d) session layer View Answer
Answer:b Explanation:None.
4. In tunnel mode IPsec protects the
a) entire IP packet
b) IP header
c) IP payload
d) none of the mentioned View Answer
Answer:a Explanation:None.
5. Network layer firewall works as a
a) frame filter
b) packet filter
c) both (a) and (b)
d) none of the mentioned View Answer
Answer:b Explanation:None.
6. Network layer firewall has two sub-categories as
a) stateful firewall and stateless firewall
b) bit oriented firewall and byte oriented firewall
c) frame firewall and packet firewall
d) none of the mentioned View Answer
Answer:a Explanation:None.
7. WPA2 is used for security in
a) ethernet
b) bluetooth
c) wi-fi
d) none of the mentioned View Answer
Answer:c Explanation:None.
8. An attempt to make a computer resource unavailable to its intended users is called
a) denial-of-service attack
b) virus attack
c) worms attack
d) botnet process View Answer
Answer:a Explanation:None.
9. Extensible authentication protocol is authentication framework frequently used in
a) wired personal area network
b) wireless networks
c) wired local area network
d) none of the mentioned View Answer
Answer:b Explanation:None.
10. Pretty good privacy (PGP) is used in
a) browser security
b) email security
c) FTP security
d) none of the mentioned View Answer
Answer:b Explanation:None.
11. PGP encrypts data by using a block cipher called
a) international data encryption algorithm
b) private data encryption algorithm
c) intrenet data encryption algorithm
d) none of the mentioned View Answer
Answer:a Explanation:None.
12. When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) none of the mentioned View Answer
Answer:c Explanation:None.
Computer Networks Questions & Answers – Security In The Internet This section of our 1000+ Computer Networks MCQs focuses on Security In The Internet.
13. IPSec is designed to provide the security at the
a) transport layer
b) network layer
c) application layer
d) session layer View Answer
Answer:b Explanation:None.
14. In tunnel mode IPsec protects the
a) entire IP packet
b) IP header
c) IP payload
d) none of the mentioned View Answer
Answer:a Explanation:None.
15. Network layer firewall works as a
a) frame filter
b) packet filter
c) both (a) and (b)
d) none of the mentioned View Answer
Answer:b Explanation:None.
16. Network layer firewall has two sub-categories as
a) stateful firewall and stateless firewall
b) bit oriented firewall and byte oriented firewall
c) frame firewall and packet firewall
d) none of the mentioned View Answer
Answer:a Explanation:None.
17. WPA2 is used for security in
a) ethernet
b) bluetooth
c) wi-fi
d) none of the mentioned View Answer
Answer:c Explanation:None.
18. An attempt to make a computer resource unavailable to its intended users is called
a) denial-of-service attack
b) virus attack
c) worms attack
d) botnet process View Answer
Answer:a Explanation:None.
19. Extensible authentication protocol is authentication framework frequently used in
a) wired personal area network
b) wireless networks
c) wired local area network
d) none of the mentioned View Answer
Answer:b Explanation:None.
20. Pretty good privacy (PGP) is used in
a) browser security
b) email security
c) FTP security
d) none of the mentioned View Answer
Answer:b Explanation:None.
21. PGP encrypts data by using a block cipher called
a) international data encryption algorithm
b) private data encryption algorithm
c) intrenet data encryption algorithm
d) none of the mentioned View Answer
a) Wired environment
b) WiFi
c) Ethernet LAN
d) All of the mentioned View Answer
Answer: d Explanation: None.
2. Firewalls are often configured to block
a) UDP traffic
b) TCP traffic
c) Both of the mentioned
d) None of the mentioned View Answer
Answer: a Explanation: None.
3. IPSec is designed to provide the security at the
a) transport layer
b) network layer
c) application layer
d) session layer View Answer
Answer:b Explanation:None.
4. In tunnel mode IPsec protects the
a) entire IP packet
b) IP header
c) IP payload
d) none of the mentioned View Answer
Answer:a Explanation:None.
5. Network layer firewall works as a
a) frame filter
b) packet filter
c) both (a) and (b)
d) none of the mentioned View Answer
Answer:b Explanation:None.
6. Network layer firewall has two sub-categories as
a) stateful firewall and stateless firewall
b) bit oriented firewall and byte oriented firewall
c) frame firewall and packet firewall
d) none of the mentioned View Answer
Answer:a Explanation:None.
7. WPA2 is used for security in
a) ethernet
b) bluetooth
c) wi-fi
d) none of the mentioned View Answer
Answer:c Explanation:None.
8. An attempt to make a computer resource unavailable to its intended users is called
a) denial-of-service attack
b) virus attack
c) worms attack
d) botnet process View Answer
Answer:a Explanation:None.
9. Extensible authentication protocol is authentication framework frequently used in
a) wired personal area network
b) wireless networks
c) wired local area network
d) none of the mentioned View Answer
Answer:b Explanation:None.
10. Pretty good privacy (PGP) is used in
a) browser security
b) email security
c) FTP security
d) none of the mentioned View Answer
Answer:b Explanation:None.
11. PGP encrypts data by using a block cipher called
a) international data encryption algorithm
b) private data encryption algorithm
c) intrenet data encryption algorithm
d) none of the mentioned View Answer
Answer:a Explanation:None.
12. When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) none of the mentioned View Answer
Answer:c Explanation:None.
Computer Networks Questions & Answers – Security In The Internet This section of our 1000+ Computer Networks MCQs focuses on Security In The Internet.
13. IPSec is designed to provide the security at the
a) transport layer
b) network layer
c) application layer
d) session layer View Answer
Answer:b Explanation:None.
14. In tunnel mode IPsec protects the
a) entire IP packet
b) IP header
c) IP payload
d) none of the mentioned View Answer
Answer:a Explanation:None.
15. Network layer firewall works as a
a) frame filter
b) packet filter
c) both (a) and (b)
d) none of the mentioned View Answer
Answer:b Explanation:None.
16. Network layer firewall has two sub-categories as
a) stateful firewall and stateless firewall
b) bit oriented firewall and byte oriented firewall
c) frame firewall and packet firewall
d) none of the mentioned View Answer
Answer:a Explanation:None.
17. WPA2 is used for security in
a) ethernet
b) bluetooth
c) wi-fi
d) none of the mentioned View Answer
Answer:c Explanation:None.
18. An attempt to make a computer resource unavailable to its intended users is called
a) denial-of-service attack
b) virus attack
c) worms attack
d) botnet process View Answer
Answer:a Explanation:None.
19. Extensible authentication protocol is authentication framework frequently used in
a) wired personal area network
b) wireless networks
c) wired local area network
d) none of the mentioned View Answer
Answer:b Explanation:None.
20. Pretty good privacy (PGP) is used in
a) browser security
b) email security
c) FTP security
d) none of the mentioned View Answer
Answer:b Explanation:None.
21. PGP encrypts data by using a block cipher called
a) international data encryption algorithm
b) private data encryption algorithm
c) intrenet data encryption algorithm
d) none of the mentioned View Answer
Answer:a Explanation:None.
22. When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) none of the mentioned View Answer
Answer:c Explanation:None.
Computer Networks Questions & Answers – Wireless LAN This section of our 1000+ Computer Networks MCQs focuses on Wireless LAN.
23. What is the access point (AP) in wireless LAN?
a) device that allows wireless devices to connect to a wired network
b) wireless devices itself
c) both (a) and (b)
d) none of the mentioned View Answer
Answer:a Explanation:None.
24. In wireless ad-hoc network
a) access point is not required
b) access point is must
c) nodes are not required
d) none of the mentioned View Answer
Answer:a Explanation:None.
25. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
a) CDMA
b) CSMA/CA
c) ALOHA
d) none of the mentioned View Answer
Answer:b Explanation:None.
26. In wireless distribution system
a) multiple access point are inter-connected with each other
b) there is no access point
c) only one access point exists
d) none of the mentioned View Answer
Answer:a Explanation:None.
27. A wireless network interface controller can work in
a) infrastructure mode
b) ad-hoc mode
c) both (a) and (b)
d) none of the mentioned View Answer
Answer:c Explanation:In infrastructure mode WNIC needs access point but in ad-hoc mode access point is not required.
28. In wireless network an extended service set is a set of
a) connected basic service sets
b) all stations
c) all access points
d) none of the mentioned View Answer
Answer:a Explanation:None.
29. Mostly ________ is used in wireless LAN.
a) time division multiplexing
b) orthogonal frequency division multiplexing
c) space division multiplexing
d) none of the mentioned View Answer
Answer:b Explanation:None.
30. Which one of the following event is not possible in wireless LAN.
a) collision detection
b) Acknowledgement of data frames
c) multi-mode data transmission
d) none of the mentioned View Answer
Answer:a Explanation:None.
22. When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) none of the mentioned View Answer
Answer:c Explanation:None.
Computer Networks Questions & Answers – Wireless LAN This section of our 1000+ Computer Networks MCQs focuses on Wireless LAN.
23. What is the access point (AP) in wireless LAN?
a) device that allows wireless devices to connect to a wired network
b) wireless devices itself
c) both (a) and (b)
d) none of the mentioned View Answer
Answer:a Explanation:None.
24. In wireless ad-hoc network
a) access point is not required
b) access point is must
c) nodes are not required
d) none of the mentioned View Answer
Answer:a Explanation:None.
25. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
a) CDMA
b) CSMA/CA
c) ALOHA
d) none of the mentioned View Answer
Answer:b Explanation:None.
26. In wireless distribution system
a) multiple access point are inter-connected with each other
b) there is no access point
c) only one access point exists
d) none of the mentioned View Answer
Answer:a Explanation:None.
27. A wireless network interface controller can work in
a) infrastructure mode
b) ad-hoc mode
c) both (a) and (b)
d) none of the mentioned View Answer
Answer:c Explanation:In infrastructure mode WNIC needs access point but in ad-hoc mode access point is not required.
28. In wireless network an extended service set is a set of
a) connected basic service sets
b) all stations
c) all access points
d) none of the mentioned View Answer
Answer:a Explanation:None.
29. Mostly ________ is used in wireless LAN.
a) time division multiplexing
b) orthogonal frequency division multiplexing
c) space division multiplexing
d) none of the mentioned View Answer
Answer:b Explanation:None.
30. Which one of the following event is not possible in wireless LAN.
a) collision detection
b) Acknowledgement of data frames
c) multi-mode data transmission
d) none of the mentioned View Answer
Answer:a Explanation:None.
No comments