ACK
FIN
SYN
RST
The amount of data that can be transmitted in a fixed amount of time
The time taken to send a message from one point to another
The speed at which the data packets are received
The delay between data transmission and reception
MAN
NAN
WAN
None of these
Collision Detection and Retransmission (CDR)
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
Token passing mechanism
Packet switching
Spoofing
Ransomware
Phishing
Keylogging
443
80
22
21
Sender
Receiver
Sender and Receiver
None of the these
300.200.100.50
192.168.1.1
10.0.0.1
255.255.255.255
Router
Switch
Multiplexer
Modem
Internet
Botnet
Telnet
D-net
To divide the network into subnetworks
To allocate IP addresses
To provide a default gateway
To encrypt data
Ring
Local Area
Hierarchical
Star
10Mbps
20Mbps
30Mbps
40Mbps
Simplex
Half Duplex
Full Duplex
Double Duplex
To identify the physical location of a device on the network
To establish a connection between two devices on the network
To uniquely identify network interfaces
To encrypt data for secure transmission
Filtering packets based on port numbers
Translating domain names to IP addresses
Determining the best path for forwarding packets to their destination
Establishing secure connections between hosts
To map a MAC address to an IP address
To route data from one network to another
To configure IP addresses dynamically
To map an IP address to a MAC address
10BASE-T
100BASE-TX
1000BASE-T
10GBASE-T
Routing packets from source to destination
Error detection and correction
Process-to-process delivery
Synchronization between devices
Industrial Software Organisation
Industrial Standards Organisation
International Software Organisation
International Standards Organisation
Unshielded twisted pair
Optical fiber
Coaxial cable
Microwave
Bandwidth
Latency
Packet size
All of the above
Wired environment
WiFi
Ethernet LAN
All of the mentioned
Computer Security
Information Security
Network Security
UDP traffic
TCP traffic
Both of the mentioned
None of the mentioned
Encryption of data
To transmit faster
To detect errors
To identify the user
Bus
Tree
Mesh
Denial-of-service attack
SQL injection
Man-in-the-middle attack
Protocol
URL
E-mail address
ICQ
53
25
transpositional ciphers
substitution ciphers
both (a) and (b)
none of the mentioned
Combining multiple signals into a single transmission medium
Assigning different frequencies to each channel
Dividing the transmission time into fixed intervals
Utilizing different modulation techniques for each channel
HTTP
SMTP
FTP
SNMP
Active receiver
Passive receiver
Bus Topology
Ring Topology
Star Topology
Mesh Topology
0.0.0.0
127.0.0.1
0.255.255.255
MX record
CNAME record
A record
PTR record
Microwaves
Binary
To identify the data rate of the network
To encrypt the wireless data
To control access to the router
To uniquely identify a wireless network
121.12.12.248
130.12.12.248
128.12.12.248
129.12.12.248
IP
OSPF
ICMP
Ethernet
IP/Netmask
IP/Subnet
IP/Router
IP/DNS
Subnetting
MAC address filtering
VLAN
CSMA/CD
Encrypting data transmissions
Blocking unauthorized access to a network
Managing cryptographic keys
Monitoring network traffic for malware
Ensuring secure encryption of data transmitted over the Internet.
Establishing physical connections between devices on the Internet.
Assigning unique addresses to devices and facilitating packet routing.
Controlling access to Internet resources through user authentication.
structure and behaviour of a computer system as observed by the developer
structure and behaviour of a computer system as observed by the user
structure of a computer system as observed by the developer
None of the above
Domain Name System
Data Network Service
Digital Networking Server
Dynamic Naming Service
Hub
Repeater