BCA - Computer Network Fundamentals
Questions No: 1/50

In which type of network do all devices share a common communication medium, and data collisions are more likely to occur?

Questions No: 2/50

Which layer of the OSI model is responsible for defining protocols for error detection, framing, and flow control?

Questions No: 3/50

Which of the following devices is commonly used to implement Frequency Division Multiplexing?

Questions No: 4/50

To read multiple bytes of a row at the same time, we make use of ______

Questions No: 5/50

What protocol is primarily used for DNS queries and responses?

Questions No: 6/50

\"Parity bits\" are used for which of the following purposes?

Questions No: 7/50

Which of the following address belongs class A?

Questions No: 8/50

In a 1\'s complement checksum scheme, how is the checksum calculated?

Questions No: 9/50

Which layer of the OSI model is responsible for logical addressing and routing?

Questions No: 10/50

In a CSMA/CD (Carrier Sense Multiple Access with Collision Detection) network, what action does a device take if it detects a collision?

Questions No: 11/50

What is the port number commonly used by DNS for resolving domain names?

Questions No: 12/50

Which standard is most popular type of e-commerce encryption?

Questions No: 13/50

Which protocol is responsible for assigning IP addresses dynamically?

Questions No: 14/50

What port number is associated with SMTP (Simple Mail Transfer Protocol) for sending emails in end-to-end communication?

Questions No: 15/50

What is the purpose of frequency division multiplexing (FDM)?

Questions No: 16/50

The process of dividing a data stream into smaller units for transmission is called:

Questions No: 17/50

Which of the following algorithms is not used in asymmetric-key cryptography?

Questions No: 18/50

In TCP, what is the purpose of the \"three-way handshake\"?

Questions No: 19/50

Which protocol operates at the Data Link Layer of the OSI model?

Questions No: 20/50

Firewalls are often configured to block:

Questions No: 21/50

Which flag in the TCP header is set to indicate the end of a TCP connection?

Questions No: 22/50

Which protocol is used for dynamically assigning IP addresses to devices on a network?

Questions No: 23/50

What is the primary role of Internet Protocol (IP) in Internet communication?

Questions No: 24/50

Which of the following is not a type of network topology?

Questions No: 25/50

Which type of authentication requires each user of the scheme to first generate a pair of keys and store each in a file

Questions No: 26/50

Low pass filter limits to

Questions No: 27/50

The ability to segment traffic based on the physical identification of devices

Questions No: 28/50

Which of the following best describes the relationship between the Internet and World Wide Web (WWW)?

Questions No: 29/50

Which layer of the TCP / IP stack corresponds to the OSI model transport layer?

Questions No: 30/50

Which of the following is the maximum data rate supported by the 802.11a standard?

Questions No: 31/50

Which encryption method is commonly used for securing email communication?

Questions No: 32/50

Which of the following is a connection-oriented protocol in networking?

Questions No: 33/50

What is the frequency range of the IEEE 802.11a standard?

Questions No: 34/50

Which layer of the OSI model is primarily responsible for flow control, which can impact throughput?

Questions No: 35/50

What is the purpose of the ARP (Address Resolution Protocol)?

Questions No: 36/50

In which security or a model, information or data is either being in motion through the communication channels

Questions No: 37/50

Which protocol is responsible for error reporting and network diagnostics in IP networks?

Questions No: 38/50

Which of the following is a key feature of the IEEE 802.11 standard?

Questions No: 39/50

What distinguishes the Internet from other types of networks?

Questions No: 40/50

What is the main characteristic of a Peer-to-Peer (P2P) network?

Questions No: 41/50

Which notation represents a CIDR notation for specifying IP addresses and their associated network prefixes?

Questions No: 42/50

Fullform of CISC ?

Questions No: 43/50

Which of the following is a characteristic of multiplexing?

Questions No: 44/50

Which of the following is NOT a valid IPv4 address?

Questions No: 45/50

In which security or a model, information or data is either being in motion through the communication channels

Questions No: 46/50

What is the relationship between bandwidth and throughput?

Questions No: 47/50

Which of the following is NOT a function of the data link layer?

Questions No: 48/50

What type of attack involves overwhelming a server with traffic to make it unavailable to legitimate users?

Questions No: 49/50

What is the main purpose of MAC (Media Access Control) addresses?

Questions No: 50/50

Which of the following is NOT an example of a network layer protocol?