Computer Networks

A computer network is a group of computer systems and other computing hardware devices that are linked together through communication channels to facilitate communication and resource-sharing among a wide range of users. Networks are commonly categorized based on their characteristics.

In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are
The structure or format of data is called
Communication between a computer and a keyboard involves ______________ transmission
The first Network
Which of this is not a constituent of residential telephone line?
The function of DSLAM is
HFC contains
StarBand provides
The number of layers in ISO OSI reference model
In OSI model, when data is sent from device A to device B, the 5th layer to receive data at B is
In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______
The physical layer concerns with
The physical layer translates logical communication requests from the ______ into hardware specific operations.
Wireless transmission can be done via
The data link layer takes the packets from _________ and encapsulates them into frames for transmission.
Which one of the following is a data link protocol?
CRC stands for
The network layer concerns with
The network layer protocol of internet is
ICMP is primarily used for
Which one of the following is a transport layer protocol used in networking?
An endpoint of an inter-process communication flow across a computer network is called
Socket-style API for windows is called
A _____ is a TCP name for a transport service access point.f
In this topology there is a central controller or hub
Data communication system spanning states, countries, or the whole world is
Multiplexing technique that shifts each signal to a different carrier frequency
Multiplexing is used in _______
Which multiplexing technique transmits digital signals ?
The attackers a network of compromised devices known as
The DoS attack is which the attacker sends deluge of packets to the targeted host
The resources needed for communication between end systems are reserved for the duration of session between end systems in ________
In _________ resources are allocated on demand.
Application layer protocol defines
Which one of the following protocol delivers/stores mail to reciever server?
In the network HTTP resources are located by
The file transfer protocol is built on
Simple mail transfer protocol (SMTP) utilizes _________ as the transport layer protocol for electronic mail transfer.
What is on-demand mail relay (ODMR)?
DNS database contains
The DHCP server
IPsec is designed to provide the security at the
Pretty good privacy (PGP) is used in
When were VPNs introduced into the commercial world?
ESP (Encapsulating Security Protocol) is defined in which of the following standards?
Main difference between SNMPv3 and SNMPv2 is the
Structure of Management Information (SMI), is guideline of
The main advantage of UDP is
Which mode of IPsec should you use to assure security and confidentiality of data within the same LAN?
In computer security… means that the information in a computer system only be accessible for reading by authorized parities.
Two broad categories of congestion control are
What is a web browser?
What is document object model (DOM)?
Which of the following field in IPv4 datagram is not related to fragmentation?
Which methods are commonly used in Server Socket class?
The URL Connection class can be used to read and write data to the specified resource referred by the URL
What is data encryption standard (DES)?
Cryptanalysis is used
A second technique to reduce routing table and simplify searching process is called
Cookies were originally designed for
This entry was posted in . Bookmark the permalink.

Leave a Reply