BCA - Computer Network Fundamentals
Questions No: 1/50

Which layer of the TCP / IP stack corresponds to the OSI model transport layer?

Questions No: 2/50

Which protocol is used for dynamically assigning IP addresses to devices on a network?

Questions No: 3/50

Firewalls are often configured to block:

Questions No: 4/50

What kind of transmission medium is most appropriate to carry data in a computer network that is exposed to electrical interferences?

Questions No: 5/50

What does ISO stands for?

Questions No: 6/50

Multi station access unit is associated with

Questions No: 7/50

What is the primary role of Internet Protocol (IP) in Internet communication?

Questions No: 8/50

Questions No: 9/50

What is the main characteristic of a Peer-to-Peer (P2P) network?

Questions No: 10/50

What is the main purpose of MAC (Media Access Control) addresses?

Questions No: 11/50

Which software prevents the external access to a system?

Questions No: 12/50

What is the default subnet mask for a Class C IP address?

Questions No: 13/50

What is the purpose of the ARP (Address Resolution Protocol)?

Questions No: 14/50

What does DNS stand for?

Questions No: 15/50

Which of the following is an example of an access control method in a network?

Questions No: 16/50

In TCP, what is the purpose of the \"acknowledgment\" field in a segment?

Questions No: 17/50

Which protocol is used for resolving domain names to IP addresses?

Questions No: 18/50

What type of attack tricks users into providing confidential information by pretending to be a legitimate entity?

Questions No: 19/50

Fullform of CISC ?

Questions No: 20/50

Which of the following devices operates at the Data Link Layer and forwards Ethernet frames based on MAC addresses?

Questions No: 21/50

Which of the following devices is commonly used to implement Frequency Division Multiplexing?

Questions No: 22/50

Which of the following architecture is suitable for a wide range of data types?

Questions No: 23/50

The term WAN stands for?

Questions No: 24/50

What is the purpose of frequency division multiplexing (FDM)?

Questions No: 25/50

\"Parity bits\" are used for which of the following purposes?

Questions No: 26/50

Packet sniffers involve:

Questions No: 27/50

What does \"bandwidth\" refer to in a computer network?

Questions No: 28/50

Which of the following is NOT a function of the data link layer?

Questions No: 29/50

Which of the following is a key feature of the IEEE 802.11 standard?

Questions No: 30/50

Which of the following best describes the relationship between the Internet and World Wide Web (WWW)?

Questions No: 31/50

Which layer of the OSI model is primarily responsible for flow control, which can impact throughput?

Questions No: 32/50

Which topology allows multiple access links between network elements

Questions No: 33/50

Which protocol is responsible for error reporting and network diagnostics in IP networks?

Questions No: 34/50

In the Internet Protocol (IP), which field is used to indicate the maximum number of hops a packet can take before being discarded?

Questions No: 35/50

Which of the following address belongs class A?

Questions No: 36/50

Which advantage is typically associated with peer-to-peer networks?

Questions No: 37/50

Which of the following is a type of attack where an attacker intercepts and relays communications between two parties?

Questions No: 38/50

In 802.11 wireless networks, what does the acronym WPA stand for?

Questions No: 39/50

In the TCP message format, what is the purpose of the Header Length field?

Questions No: 40/50

Which of the following is the maximum data rate supported by the 802.11a standard?

Questions No: 41/50

What is the relationship between bandwidth and throughput?

Questions No: 42/50

Which of the following IP addresses can be used as (a) loop-back addresses?

Questions No: 43/50

The number of connections in a tree topology is calculated using which formula

Questions No: 44/50

What security protocol is recommended for use in modern 802.11 wireless networks?

Questions No: 45/50

Which technique is commonly used by the Data Link Layer to detect errors in transmitted frames?

Questions No: 46/50

What is the primary advantage of analog encoding of digital signals in transmission?

Questions No: 47/50

The process of dividing a data stream into smaller units for transmission is called:

Questions No: 48/50

In a client-server model, the server provides services to clients over the network. Which one is not a common service provided by servers?

Questions No: 49/50

What type of attack involves overwhelming a server with traffic to make it unavailable to legitimate users?

Questions No: 50/50

Which layer of the OSI model is responsible for logical addressing and routing?