BCA - Computer Network Fundamentals
Questions No: 1/50

Which of the following is not a type of network topology?

Questions No: 2/50

Firewalls are often configured to block:

Questions No: 3/50

Which of the following is NOT a valid IPv4 address?

Questions No: 4/50

Which of the following is a primary function of the Network Layer in the OSI model?

Questions No: 5/50

What is one disadvantage of Peer-to-Peer networks?

Questions No: 6/50

Which flag in the TCP header is set to indicate the end of a TCP connection?

Questions No: 7/50

Which of the following is NOT an example of a network layer protocol?

Questions No: 8/50

Which of the following architecture is suitable for a wide range of data types?

Questions No: 9/50

The number of connections in a tree topology is calculated using which formula

Questions No: 10/50

Multi station access unit is associated with

Questions No: 11/50

What distinguishes the Internet from other types of networks?

Questions No: 12/50

Which of the following CIDR ranges encompasses the most IP addresses?

Questions No: 13/50

What is the main purpose of MAC (Media Access Control) addresses?

Questions No: 14/50

What is the purpose of frequency division multiplexing (FDM)?

Questions No: 15/50

In which security or a model, information or data is either being in motion through the communication channels

Questions No: 16/50

Questions No: 17/50

Questions No: 18/50

In the Internet Protocol (IP), which field is used to indicate the maximum number of hops a packet can take before being discarded?

Questions No: 19/50

What is the relationship between bandwidth and throughput?

Questions No: 20/50

Which protocol is used for dynamically assigning IP addresses to devices on a network?

Questions No: 21/50

Which technique is commonly used by the Data Link Layer to detect errors in transmitted frames?

Questions No: 22/50

Which of the following is a key feature of the IEEE 802.11 standard?

Questions No: 23/50

The attackers a network of compromised devices known as:

Questions No: 24/50

In 802.11 wireless networks, what does the acronym WPA stand for?

Questions No: 25/50

Ethernet physical topologies have how much of data rate while sending a packet using coaxial cable

Questions No: 26/50

What is the purpose of an SSID (Service Set Identifier) in an 802.11 wireless network?

Questions No: 27/50

Which transmission technology is most commonly used for long-distance communication?

Questions No: 28/50

What is the primary advantage of analog encoding of digital signals in transmission?

Questions No: 29/50

Which of the following devices is commonly used to implement Frequency Division Multiplexing?

Questions No: 30/50

In a 1\'s complement checksum scheme, how is the checksum calculated?

Questions No: 31/50

What is the fundamental principle behind Time Division Multiplexing (TDM)?

Questions No: 32/50

Which protocol is responsible for assigning IP addresses dynamically?

Questions No: 33/50

What is the primary function of a firewall in computer security?

Questions No: 34/50

________ are used to generating different type/s of control signals.

Questions No: 35/50

Which layer of the OSI model is responsible for defining protocols for error detection, framing, and flow control?

Questions No: 36/50

What does \"latency\" refer to

Questions No: 37/50

The term HTTP stands for?

Questions No: 38/50

What is the purpose of a subnet mask in a network?

Questions No: 39/50

Which of the following algorithms is not used in asymmetric-key cryptography?

Questions No: 40/50

Which of the following is NOT a function of the transport layer?

Questions No: 41/50

What is the frequency range of the IEEE 802.11a standard?

Questions No: 42/50

In TCP, what is the purpose of the \"three-way handshake\"?

Questions No: 43/50

Which of the following is a type of attack where an attacker intercepts and relays communications between two parties?

Questions No: 44/50

Which of the following devices operates at the Data Link Layer and forwards Ethernet frames based on MAC addresses?

Questions No: 45/50

What is the length of an IPv6 address?

Questions No: 46/50

What is the main advantage of the hierarchical network design?

Questions No: 47/50

What is the role of a router in the Network Layer?

Questions No: 48/50

What kind of transmission medium is most appropriate to carry data in a computer network that is exposed to electrical interferences?

Questions No: 49/50

Which Ethernet standard introduced full-duplex communication, allowing devices to transmit and receive data simultaneously?

Questions No: 50/50

In which security or a model, information or data is either being in motion through the communication channels