File sharing
Database management
Peer-to-peer connection
Web hosting
Filtering
Encoding
Switching
None of the mentioned
Error detection and correction
Routing
Flow control
Framing
Dual Host
TCP
OSI
proxy
It specifies the total length of the TCP segment
It indicates the length of the TCP header in 32-bit words
It denotes the maximum segment size that can be transmitted
It identifies the TCP version being used
Spoofing
Ransomware
Phishing
Keylogging
The amount of data that can be transmitted in a fixed amount of time
The time taken to send a message from one point to another
The speed at which the data packets are received
The delay between data transmission and reception
802.11
802.5
802.4
802.2
Encryption
Multiplexing
Segmentation
443
80
22
21
HTTP
SMTP
FTP
SNMP
Sender
Receiver
Sender and Receiver
None of the these
Collision Detection and Retransmission (CDR)
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
Token passing mechanism
Packet switching
IP
OSPF
ICMP
Ethernet
Encryption of data
To transmit faster
To detect errors
To identify the user
It immediately retransmits the frame.
It sends a jam signal to inform other devices of the collision.
It waits for a random amount of time before retransmitting.
It increases the transmission power to avoid collisions.
The number of bits transferred per second
The frequency of the carrier wave
The number of errors corrected per second
The speed of the modem
To identify the physical location of a device on the network
To establish a connection between two devices on the network
To uniquely identify network interfaces
To encrypt data for secure transmission
It decreases the efficiency of data transmission
It involves combining multiple signals into a single transmission medium
It can only be used in analog communication systems
It reduces the complexity of the network
Transport Layer
Presentation Layer
Session Layer
Application Layer
Protocol
URL
E-mail address
ICQ
UDP traffic
TCP traffic
Both of the mentioned
32 bits
64 bits
128 bits
256 bits
UDP
Firewall
Gateway
Router
Virus checker
Encrypting data transmissions
Blocking unauthorized access to a network
Managing cryptographic keys
Monitoring network traffic for malware
To map an IP address to a MAC address
To map a MAC address to an IP address
To route data from one network to another
To configure IP addresses dynamically
Wireless Protected Access
Wired Protected Access
Wi-Fi Protected Access
Wireless Private Access
WEP
WPA
WEP2
WPA2
Segmentation and reassembly
Packet routing
Physical
Network
Data Link
Transport
Bus
Tree
Mesh
Star
255.0.0.0
255.255.255.0
255.255.0.0
255.255.255.255
Ensuring secure encryption of data transmitted over the Internet.
Establishing physical connections between devices on the Internet.
Assigning unique addresses to devices and facilitating packet routing.
Controlling access to Internet resources through user authentication.
25
Domain Name System
Data Network Service
Digital Networking Server
Dynamic Naming Service
MX record
CNAME record
A record
PTR record
To divide the network into subnetworks
To allocate IP addresses
To provide a default gateway
To encrypt data
Higher data transfer rates
Reduced susceptibility to noise
Greater compatibility with modern devices
Lower power consumption
To indicate the start of a data frame
To provide redundancy for error correction
To detect errors in transmitted data
To ensure the confidentiality of the data
ARP
DHCP
RARP
Hub
Repeater
Switch
Cutoff frequency
Low frequencies
upper high frequencies
Latch
Shift register
Memory extension
Cache
block cipher
stream cipher
bit cipher
none of the mentioned
68000
ASUS firebird
IA-32
ARM
Checksum
Hashing
Hamming Code
Faster data transmission
Easier network management
Reduced cost of hardware
Larger bandwidth allocation
Combining multiple signals into a single transmission medium
Assigning different frequencies to each channel
Dividing the transmission time into fixed intervals
Utilizing different modulation techniques for each channel