THAKUR INSTITUTE SHOP NO. 36, SECOND FLOOR, CHAITANYA COMPLEX, BUS STAND BHOPAL (M.P.)462001 MOB. 9713222253,9300006806 Networking Important Question with reference to Barkatullaha University Choose the correct answer (i) Ans.: (ii) A computer communication technology that provides a way to the connect multiple computer across short distance: (A)Wireless Network (B)LAN (C)WAN (D)MAN (B)LAN A device that forwords data packet from one network to another is called a: (A)Switch (B)Bridge (C)Gateway (D)None of these Ans.: (iii) DNCP stands for: (A)Dynamic Hub Configuration Protocol (C)Dynamic Host Configuration Protocol (B)Digital Host Configuration Protocol (D)None of these Ans.: (iv) IPv4 uses _______ bit: (A)32 bit (B)64 bit (C)128 bit (D)None of these Ans.: (v) Ans.: (vi) Mechanism to protect private networks from outside attack is: (A)Antivirus (B)Firewall (C)Digital Signature (B)Firewall (D)None of these This layer establishes, maintains and synchronizes the interaction between communication system (A)Transport (B)Presentation (C)Session (D)Data Link Ans.: (vii) _________ is the set of techniques that allows the simultaneous transmission of multiple signals across a single data link: (A)Multiplexing (B)Demultiplexing (C)Both (D)None Ans.: (viii) Which one of the following is class C address: (A)191.255.68.232 (B)192.255.68.232 (C)255.255.255.255 (D)239.1.32.68 C, C++, JAVA, ORACLE, OS, DBMS, PROJECTS, VB6.0,Digital Computer Page 1 THAKUR INSTITUTE SHOP NO. 36, SECOND FLOOR, CHAITANYA COMPLEX, BUS STAND BHOPAL (M.P.)462001 MOB. 9713222253,9300006806 Ans.: (ix) Ans.: Full form of MPLS is _______ (x) Which processes does TCP, but not UDP, use? (A)Windowing (B)Acknowledgements (C)Source Port (D)Destination Port Ans.: (xi) Process of converting analog signal to digital signal is called? (A)Modulation (B)Transformation (C)Demodulation (D)None Ans.: (xii) Full form of SONET is? Ans.: (xiii) Hub is a network devices which sends the information to all connected computer within a network? Ans.: (xiv) Number of classes defined for IP addressing are? (A)2 (B)3 (C)5 (D)7 Ans.: (xv) IP address size in IPv6 is ........ bits? (A)256 (B)128 (C)64 (D)32 Ans.: (xvi) Full form of RSVP is ? Ans.: (xvii) An ATM cell consists of ........ byte header? (A)3 (B)5 (C)8 (D)48 Ans.: (xviii) RSA algorigthm involves? (A)Public key (B)Private Key Ans.: (C)Both (A&B) (D)None (xviii) A ....... is a system that prevents unauthorized use and access to your computer? C, C++, JAVA, ORACLE, OS, DBMS, PROJECTS, VB6.0,Digital Computer Page 2 THAKUR INSTITUTE SHOP NO. 36, SECOND FLOOR, CHAITANYA COMPLEX, BUS STAND BHOPAL (M.P.)462001 MOB. 9713222253,9300006806 (A)Wi-Fi Ans.: (D)Firewall (B)Bluetooth (C)Modem (D)Firewall Short Answer Type Questions 1. 2. 4. 5. 6. 7. 8. Differentiate among the following (A)LAN, WAN, MAN (B)Analog and Digital Signal (C)Modulation and Demodulation Briefly explain the following? (A)Bridge (B)Gateway (C)Repeaters (D)TCP/IP (E)Mobile IP (F)DNS (G)ATM Network (H)PNNI routing (I)IP over ATM (J)MPLS (K)HUB (L)Router (M)IP addressig-Classes (N)Network layesr (TCP/IP) What is cryptography? Explain its advantages and disadvantages? Explain network security. Discuss briefly various levels security? Define networking? what are its types? Define DHCP and mobile-IP? Expalin multiprotocol label switching? Long Answer Type Questions 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. What is netowkr topologies? What factors enter into the selection of network topology? Explain different types of transmission media and their merits and demerits over another media. Discuss the functionalities of each layer of OSI reference model. Briefly explain the following: (A)CSMA/CD (B)Multiplexing (C)Packet and Circuit Switching (D)IPv4 (E)DNSP (F)Internet routing (G)Protocols (H)Wi-Fi (I)Virus & Worm (J)Bluetooth Technology (K)SMTP (L)FTP (M)TFTP (N)BISDN reference model (O) Difference between IPv4 &IPv6 Discuss tha architecture face work of TCP/IP reference model? What are IP address? How are IP address allocated to computer? Explain subnetting also? What is RVSP? Discuss the application of RSVP? Explain briefly how firewalls protect network? What is the role of AAL and ATM layes? What is RSVP. how this protocol is used for making the reservation? What is cryptography? What are symmetric key algorithm? C, C++, JAVA, ORACLE, OS, DBMS, PROJECTS, VB6.0,Digital Computer Page 3 THAKUR INSTITUTE SHOP NO. 36, SECOND FLOOR, CHAITANYA COMPLEX, BUS STAND BHOPAL (M.P.)462001 MOB. 9713222253,9300006806 12. 13. 14. 15. How data can be secured over networks? What are security protocols? What do you mean by network topology. Explain different topologies? Explain physical components of a network? Explain the different overlay models? C, C++, JAVA, ORACLE, OS, DBMS, PROJECTS, VB6.0,Digital Computer Page 4