Breaking News

Computer Network MCQs by General knowledge Solutions

Computer Network MCQs by General knowledge Solutions

                                                                               



1. Sniffers can be deployed in
a) Wired environment
b) WiFi
c) Ethernet LAN
d) All of the mentioned View Answer

 Answer: d Explanation: None.

2. Firewalls are often configured to block
a) UDP traffic
b) TCP traffic
c) Both of the mentioned
d) None of the mentioned View Answer

 Answer: a Explanation: None.

3. IPSec is designed to provide the security at the
a) transport layer
b) network layer
c) application layer
d) session layer View Answer

Answer:b Explanation:None.

4. In tunnel mode IPsec protects the
a) entire IP packet
b) IP header
c) IP payload
d) none of the mentioned View Answer

 Answer:a Explanation:None.

5. Network layer firewall works as a
a) frame filter
b) packet filter
c) both (a) and (b)
d) none of the mentioned View Answer

 Answer:b Explanation:None.

6. Network layer firewall has two sub-categories as
a) stateful firewall and stateless firewall
b) bit oriented firewall and byte oriented firewall
c) frame firewall and packet firewall
d) none of the mentioned View Answer

Answer:a Explanation:None.

7. WPA2 is used for security in
a) ethernet
b) bluetooth
c) wi-fi
d) none of the mentioned View Answer

Answer:c Explanation:None.

8. An attempt to make a computer resource unavailable to its intended users is called
a) denial-of-service attack
b) virus attack
c) worms attack
d) botnet process View Answer

Answer:a Explanation:None.

9. Extensible authentication protocol is authentication framework frequently used in
a) wired personal area network
b) wireless networks
c) wired local area network
d) none of the mentioned View Answer

Answer:b Explanation:None.

10. Pretty good privacy (PGP) is used in
a) browser security
b) email security
c) FTP security
d) none of the mentioned View Answer

Answer:b Explanation:None.

11. PGP encrypts data by using a block cipher called
a) international data encryption algorithm
b) private data encryption algorithm
c) intrenet data encryption algorithm
d) none of the mentioned View Answer

Answer:a Explanation:None.

12. When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) none of the mentioned View Answer

 Answer:c Explanation:None.

 Computer Networks Questions & Answers – Security In The Internet This section of our 1000+ Computer Networks MCQs focuses on Security In The Internet.

13. IPSec is designed to provide the security at the
a) transport layer
b) network layer
c) application layer
d) session layer View Answer

 Answer:b Explanation:None.

14. In tunnel mode IPsec protects the
a) entire IP packet
b) IP header
c) IP payload
d) none of the mentioned View Answer

 Answer:a Explanation:None.

15. Network layer firewall works as a
a) frame filter
b) packet filter
c) both (a) and (b)
d) none of the mentioned View Answer

 Answer:b Explanation:None.

16. Network layer firewall has two sub-categories as
a) stateful firewall and stateless firewall
b) bit oriented firewall and byte oriented firewall
c) frame firewall and packet firewall
d) none of the mentioned View Answer

Answer:a Explanation:None.

17. WPA2 is used for security in
a) ethernet
b) bluetooth
c) wi-fi
d) none of the mentioned View Answer

 Answer:c Explanation:None.

 18. An attempt to make a computer resource unavailable to its intended users is called
a) denial-of-service attack
b) virus attack
c) worms attack
d) botnet process View Answer

Answer:a Explanation:None.

19. Extensible authentication protocol is authentication framework frequently used in
a) wired personal area network
b) wireless networks
c) wired local area network
d) none of the mentioned View Answer

 Answer:b Explanation:None.

20. Pretty good privacy (PGP) is used in
a) browser security
b) email security
c) FTP security
d) none of the mentioned View Answer

 Answer:b Explanation:None.

 21. PGP encrypts data by using a block cipher called
a) international data encryption algorithm
b) private data encryption algorithm
c) intrenet data encryption algorithm
d) none of the mentioned View Answer




Answer:a Explanation:None.

22. When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) none of the mentioned View Answer

 Answer:c Explanation:None.

Computer Networks Questions & Answers – Wireless LAN This section of our 1000+ Computer Networks MCQs focuses on Wireless LAN.

23. What is the access point (AP) in wireless LAN?
a) device that allows wireless devices to connect to a wired network
b) wireless devices itself
c) both (a) and (b)
d) none of the mentioned View Answer

Answer:a Explanation:None.

24. In wireless ad-hoc network
a) access point is not required
b) access point is must
c) nodes are not required
d) none of the mentioned View Answer

Answer:a Explanation:None.

25. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
a) CDMA
b) CSMA/CA
c) ALOHA
d) none of the mentioned View Answer

 Answer:b Explanation:None.

26. In wireless distribution system
a) multiple access point are inter-connected with each other
b) there is no access point
c) only one access point exists
d) none of the mentioned View Answer

 Answer:a Explanation:None.

27. A wireless network interface controller can work in
a) infrastructure mode
b) ad-hoc mode
c) both (a) and (b)
d) none of the mentioned View Answer

 Answer:c Explanation:In infrastructure mode WNIC needs access point but in ad-hoc mode access point is not required.

28. In wireless network an extended service set is a set of
a) connected basic service sets
b) all stations
c) all access points
d) none of the mentioned View Answer

Answer:a Explanation:None.

29. Mostly ________ is used in wireless LAN.
a) time division multiplexing
b) orthogonal frequency division multiplexing
c) space division multiplexing
d) none of the mentioned View Answer

Answer:b Explanation:None.

30. Which one of the following event is not possible in wireless LAN.
a) collision detection
b) Acknowledgement of data frames
c) multi-mode data transmission
d) none of the mentioned View Answer

 Answer:a Explanation:None. 

No comments