Star
Ring
Tree
Binary
UDP traffic
TCP traffic
Both of the mentioned
None of the mentioned
300.200.100.50
192.168.1.1
10.0.0.1
255.255.255.255
Routing packets from source to destination
Error detection and correction
Process-to-process delivery
Synchronization between devices
They require a centralized server
They can be less secure than client-server networks
They are more difficult to set up
They have limited scalability
ACK
FIN
SYN
RST
IP
OSPF
ICMP
Ethernet
68000
ASUS firebird
IA-32
ARM
L=n*5
L=n-2
L=n-1
L=n*8
802.11
802.5
802.4
802.2
The Internet exclusively uses wired connections.
The Internet is limited to communication within a single organization.
The Internet is a globally interconnected network of networks.
The Internet is controlled by a single centralized authority.
/24
/16
/32
/8
To identify the physical location of a device on the network
To establish a connection between two devices on the network
To uniquely identify network interfaces
To encrypt data for secure transmission
To increase the speed of data transmission
To reduce latency in the network
To divide the available bandwidth into multiple channels
Computer Security
Information Security
Network Security
None of these
Dual Host
TCP
OSI
proxy
Software
Protocol
Hardware
Time-To-Live (TTL)
Destination Address
Source Address
Checksum
Bandwidth is always higher than throughput
Bandwidth and throughput are the same
Bandwidth defines the theoretical maximum data rate, while throughput is the actual data rate achieved
Throughput is always higher than bandwidth
DHCP
FTP
DNS
SNMP
Hashing
Encryption
Hamming Code
Collision Detection and Retransmission (CDR)
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
Token passing mechanism
Packet switching
Internet
Botnet
Telnet
D-net
Wi-Fi Protected Access
Wireless Protected Access
Wired Protected Access
Wireless Private Access
10Mbps
20Mbps
30Mbps
40Mbps
To identify the data rate of the network
To encrypt the wireless data
To control access to the router
To uniquely identify a wireless network
Wi-Fi
Fiber optics
Bluetooth
Higher data transfer rates
Reduced susceptibility to noise
Greater compatibility with modern devices
Lower power consumption
Router
Switch
Multiplexer
Modem
By counting the number of 1s in the data
By summing all the data bits and taking the complement
By XORing all the data bytes
By appending a fixed checksum value to the data
Combining multiple signals into a single transmission medium
Assigning different frequencies to each channel
Dividing the transmission time into fixed intervals
Utilizing different modulation techniques for each channel
ARP
RARP
Encrypting data transmissions
Blocking unauthorized access to a network
Managing cryptographic keys
Monitoring network traffic for malware
structure and behaviour of a computer system as observed by the developer
structure and behaviour of a computer system as observed by the user
structure of a computer system as observed by the developer
None of the above
Physical Layer
Data Link Layer
Transport Layer
Presentation Layer
The total number of packets sent over the network
The amount of data loss during transmission
The signal strength between two nodes
The amount of time data spends in transit
Hyper terminal tracing program
Hypertext tracing protocol
Hypertext transfer protocol
Hypertext transfer program
To divide the network into subnetworks
To allocate IP addresses
To provide a default gateway
To encrypt data
RSA algorithm
Diffie-Hellman algorithm
Electronic code book algorithm
Flow control
Segmentation and reassembly
Packet routing
2.4Gbps
5Gbps
2.4GHz
5GHz
To establish a connection
To terminate a connection
To transmit data
To check for errors in data
Phishing
Denial-of-service attack
SQL injection
Man-in-the-middle attack
Hub
Repeater
32 bits
64 bits
128 bits
256 bits
Faster data transmission
Easier network management
Reduced cost of hardware
Larger bandwidth allocation
Filtering packets based on port numbers
Translating domain names to IP addresses
Determining the best path for forwarding packets to their destination
Establishing secure connections between hosts
Unshielded twisted pair
Optical fiber
Coaxial cable
Microwave
10BASE-T
100BASE-TX
1000BASE-T
10GBASE-T