BCA - Computer Network Fundamentals
Questions No: 1/50

Which protocol is used for resolving domain names to IP addresses?

Questions No: 2/50

What is the purpose of the ARP (Address Resolution Protocol)?

Questions No: 3/50

The term WAN stands for?

Questions No: 4/50

What type of attack tricks users into providing confidential information by pretending to be a legitimate entity?

Questions No: 5/50

Which of the following is an example of an access control method in a network?

Questions No: 6/50

In which type of network do all devices share a common communication medium, and data collisions are more likely to occur?

Questions No: 7/50

Which of the following address belongs class A?

Questions No: 8/50

What is the purpose of a subnet mask in a network?

Questions No: 9/50

Which transmission technology is most commonly used for long-distance communication?

Questions No: 10/50

Low pass filter limits to

Questions No: 11/50

Which notation represents a CIDR notation for specifying IP addresses and their associated network prefixes?

Questions No: 12/50

The attackers a network of compromised devices known as:

Questions No: 13/50

What is the primary function of the Domain Name System (DNS)?

Questions No: 14/50

What is the default subnet mask for a Class C IP address?

Questions No: 15/50

Which of the following factors can affect the throughput of a network?

Questions No: 16/50

________ are used to generating different type/s of control signals.

Questions No: 17/50

What is one disadvantage of Peer-to-Peer networks?

Questions No: 18/50

Wi MAx uses

Questions No: 19/50

What is the main purpose of MAC (Media Access Control) addresses?

Questions No: 20/50

Which encryption method is commonly used for securing email communication?

Questions No: 21/50

What does \"bandwidth\" refer to in a computer network?

Questions No: 22/50

Which protocol operates at the Data Link Layer of the OSI model?

Questions No: 23/50

Ethernet physical topologies have how much of data rate while sending a packet using coaxial cable

Questions No: 24/50

The term HTTP stands for?

Questions No: 25/50

In cryptography, the order of the letters in a message is rearranged by

Questions No: 26/50

Which of the following is not a type of network topology?

Questions No: 27/50

What is the primary function of a firewall in computer security?

Questions No: 28/50

Which of the following is NOT a function of the data link layer?

Questions No: 29/50

Fullform of CISC ?

Questions No: 30/50

Which of the following CIDR ranges encompasses the most IP addresses?

Questions No: 31/50

What distinguishes the Internet from other types of networks?

Questions No: 32/50

\"Parity bits\" are used for which of the following purposes?

Questions No: 33/50

Which technique is commonly used by the Data Link Layer to detect errors in transmitted frames?

Questions No: 34/50

Which Layer moves packets from router to router along the path from a source host to destination host

Questions No: 35/50

In which security or a model, information or data is either being in motion through the communication channels

Questions No: 36/50

What is the main advantage of the hierarchical network design?

Questions No: 37/50

What is data encryption standard (DES)?

Questions No: 38/50

To read multiple bytes of a row at the same time, we make use of ______

Questions No: 39/50

What is the main purpose of MAC (Media Access Control) addresses?

Questions No: 40/50

What does DNS stand for?

Questions No: 41/50

Which port is commonly used for SSH (Secure Shell) connections in end-to-end communication?

Questions No: 42/50

Which of the following is NOT a valid IPv4 address?

Questions No: 43/50

The location of a resource on the internet is given by its?

Questions No: 44/50

What is the primary purpose of the IEEE 802.11 standard?

Questions No: 45/50

In which security or a model, information or data is either being in motion through the communication channels

Questions No: 46/50

The private key in asymmetric key cryptography is kept by?

Questions No: 47/50

Which of the following devices is commonly used to implement Frequency Division Multiplexing?

Questions No: 48/50

Which topology allows multiple access links between network elements

Questions No: 49/50

Which of the following is a characteristic of multiplexing?

Questions No: 50/50

Which protocol is responsible for error reporting and network diagnostics in IP networks?