Click To

advertisement
THAKUR INSTITUTE
SHOP NO. 36, SECOND FLOOR, CHAITANYA COMPLEX, BUS STAND BHOPAL (M.P.)462001
MOB. 9713222253,9300006806
Networking Important Question with reference to Barkatullaha University
Choose the correct answer
(i)
Ans.:
(ii)
A computer communication technology that provides a way to the connect multiple computer
across short distance:
(A)Wireless Network
(B)LAN
(C)WAN
(D)MAN
(B)LAN
A device that forwords data packet from one network to another is called a:
(A)Switch
(B)Bridge
(C)Gateway (D)None of these
Ans.:
(iii)
DNCP stands for:
(A)Dynamic Hub Configuration Protocol
(C)Dynamic Host Configuration Protocol
(B)Digital Host Configuration Protocol
(D)None of these
Ans.:
(iv)
IPv4 uses _______ bit:
(A)32 bit
(B)64 bit
(C)128 bit
(D)None of these
Ans.:
(v)
Ans.:
(vi)
Mechanism to protect private networks from outside attack is:
(A)Antivirus
(B)Firewall
(C)Digital Signature
(B)Firewall
(D)None of these
This layer establishes, maintains and synchronizes the interaction between communication
system
(A)Transport
(B)Presentation
(C)Session
(D)Data Link
Ans.:
(vii)
_________ is the set of techniques that allows the simultaneous transmission of multiple signals
across a single data link:
(A)Multiplexing
(B)Demultiplexing (C)Both
(D)None
Ans.:
(viii)
Which one of the following is class C address:
(A)191.255.68.232 (B)192.255.68.232 (C)255.255.255.255 (D)239.1.32.68
C, C++, JAVA, ORACLE, OS, DBMS, PROJECTS, VB6.0,Digital Computer
Page 1
THAKUR INSTITUTE
SHOP NO. 36, SECOND FLOOR, CHAITANYA COMPLEX, BUS STAND BHOPAL (M.P.)462001
MOB. 9713222253,9300006806
Ans.:
(ix)
Ans.:
Full form of MPLS is _______
(x)
Which processes does TCP, but not UDP, use?
(A)Windowing
(B)Acknowledgements
(C)Source Port
(D)Destination Port
Ans.:
(xi)
Process of converting analog signal to digital signal is called?
(A)Modulation
(B)Transformation (C)Demodulation
(D)None
Ans.:
(xii)
Full form of SONET is?
Ans.:
(xiii)
Hub is a network devices which sends the information to all connected computer within a
network?
Ans.:
(xiv)
Number of classes defined for IP addressing are?
(A)2
(B)3
(C)5
(D)7
Ans.:
(xv)
IP address size in IPv6 is ........ bits?
(A)256
(B)128
(C)64
(D)32
Ans.:
(xvi) Full form of RSVP is ?
Ans.:
(xvii)
An ATM cell consists of ........ byte header?
(A)3
(B)5
(C)8
(D)48
Ans.:
(xviii) RSA algorigthm involves?
(A)Public key
(B)Private Key
Ans.:
(C)Both (A&B)
(D)None
(xviii) A ....... is a system that prevents unauthorized use and access to your computer?
C, C++, JAVA, ORACLE, OS, DBMS, PROJECTS, VB6.0,Digital Computer
Page 2
THAKUR INSTITUTE
SHOP NO. 36, SECOND FLOOR, CHAITANYA COMPLEX, BUS STAND BHOPAL (M.P.)462001
MOB. 9713222253,9300006806
(A)Wi-Fi
Ans.: (D)Firewall
(B)Bluetooth
(C)Modem
(D)Firewall
Short Answer Type Questions
1.
2.
4.
5.
6.
7.
8.
Differentiate among the following
(A)LAN, WAN, MAN
(B)Analog and Digital Signal
(C)Modulation and Demodulation
Briefly explain the following?
(A)Bridge
(B)Gateway
(C)Repeaters
(D)TCP/IP
(E)Mobile IP
(F)DNS
(G)ATM Network
(H)PNNI routing
(I)IP over ATM
(J)MPLS
(K)HUB
(L)Router
(M)IP addressig-Classes
(N)Network layesr (TCP/IP)
What is cryptography? Explain its advantages and disadvantages?
Explain network security. Discuss briefly various levels security?
Define networking? what are its types?
Define DHCP and mobile-IP?
Expalin multiprotocol label switching?
Long Answer Type Questions
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
What is netowkr topologies? What factors enter into the selection of network topology?
Explain different types of transmission media and their merits and demerits over another media.
Discuss the functionalities of each layer of OSI reference model.
Briefly explain the following:
(A)CSMA/CD
(B)Multiplexing
(C)Packet and Circuit Switching
(D)IPv4
(E)DNSP
(F)Internet routing
(G)Protocols
(H)Wi-Fi
(I)Virus & Worm
(J)Bluetooth Technology
(K)SMTP
(L)FTP
(M)TFTP
(N)BISDN reference model
(O) Difference between IPv4 &IPv6
Discuss tha architecture face work of TCP/IP reference model?
What are IP address? How are IP address allocated to computer? Explain subnetting also?
What is RVSP? Discuss the application of RSVP?
Explain briefly how firewalls protect network?
What is the role of AAL and ATM layes?
What is RSVP. how this protocol is used for making the reservation?
What is cryptography? What are symmetric key algorithm?
C, C++, JAVA, ORACLE, OS, DBMS, PROJECTS, VB6.0,Digital Computer
Page 3
THAKUR INSTITUTE
SHOP NO. 36, SECOND FLOOR, CHAITANYA COMPLEX, BUS STAND BHOPAL (M.P.)462001
MOB. 9713222253,9300006806
12.
13.
14.
15.
How data can be secured over networks? What are security protocols?
What do you mean by network topology. Explain different topologies?
Explain physical components of a network?
Explain the different overlay models?
C, C++, JAVA, ORACLE, OS, DBMS, PROJECTS, VB6.0,Digital Computer
Page 4
Download