Data communication and networking Practice Question and Answer

Q:

The company has a large network which is divided into smaller parts. By using which device LAN can be divided into different parts?

822 0

  • 1
    an internal firewall
    Correct
    Wrong
  • 2
    router between subnets
    Correct
    Wrong
  • 3
    individual switch for department
    Correct
    Wrong
  • 4
    all of the above
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 4. "all of the above"

Q:

Which of the following devices tells the difference between multicast and unicast packets?

787 0

  • 1
    multicast switch
    Correct
    Wrong
  • 2
    developed
    Correct
    Wrong
  • 3
    advanced router
    Correct
    Wrong
  • 4
    multicast router
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 1. "multicast switch"
Explanation :

Multicast switch


Q:

Which data transport medium has the highest data transfer rate?

744 0

  • 1
    Twisted Cable
    Correct
    Wrong
  • 2
    Co-Axial Cable
    Correct
    Wrong
  • 3
    Optical Fiber
    Correct
    Wrong
  • 4
    None of these
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 3. "Optical Fiber"
Explanation :

1. Optical fibres use total internal reflection to transfer data. The primary condition for total internal reflection is that the signal must travel from an optically denser medium to an optically rarer medium. Secondly, the angle of incidence must be greater than the critical angle.

Q:

Which subnet is used for LAN security to bring stability in the Internet network?

723 0

  • 1
    static router
    Correct
    Wrong
  • 2
    dynamic router
    Correct
    Wrong
  • 3
    static switch
    Correct
    Wrong
  • 4
    dynamic switch
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 1. "static router"

Q:

Which of the following methods is used to secure and protect sensitive data on computer systems?

709 0

  • 1
    encryption
    Correct
    Wrong
  • 2
    Defragmentation
    Correct
    Wrong
  • 3
    Formatting
    Correct
    Wrong
  • 4
    rebooting
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 1. "encryption"
Explanation :

1. Encryption is the process of encoding data in cryptography.

2. This process transforms the plaintext or original representation of data into ciphertext or alternative representation of the data.

3. Only authorized parties should be able to decipher the ciphertext back into plaintext and access the original data.

4. Encryption in itself does not prevent interference, but it hinders interceptors from deciphering the content.

Q:

The full name of FTP is:

686 0

  • 1
    File Transfer Protocol
    Correct
    Wrong
  • 2
    Fast Trans Travel Protocol
    Correct
    Wrong
  • 3
    File Tracking Protocol
    Correct
    Wrong
  • 4
    File transfer process
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 1. "File Transfer Protocol"
Explanation :

1. The full name of FTP is File Transfer Protocol.

2. It is a network protocol used to transfer files between two computers.

3. FTP is a two-way protocol, which means both computers can send and receive files from each other.

4. FTP runs in two main modes-

- Unprotected Mode: This mode transfers files without any protection.

- Secure Mode: This mode uses encryption to transfer files using SSL or TLS.

Q:

What is the complete form of Upi?

658 0

  • 1
    Unified Payment Interface
    Correct
    Wrong
  • 2
    Unified Pay Interface
    Correct
    Wrong
  • 3
    Uniform Payment Interface
    Correct
    Wrong
  • 4
    None of the above
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 1. "Unified Payment Interface"
Explanation :

1. UPI (Unified Payments Interface): UPI is a mobile-based payment system that allows users to transfer money from their bank accounts to any other bank account instantly and securely.

2. As a UPI user, you have to create a unique identifier called UPI ID. It is linked to your bank account. With its help, money can be easily sent and received from the bank account. For this, you do not need to share your account number or other information.

Q:

Junk e-mail is called:

650 0

  • 1
    Spam
    Correct
    Wrong
  • 2
    Spoof
    Correct
    Wrong
  • 3
    Sniffer script
    Correct
    Wrong
  • 4
    Spool
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 1. "Spam"
Explanation :

1. Junk email is called spam. Spam is an email that you did not request, and which usually promotes advertising or other unwanted content.

2. Spoofing is a special type of cyber-attack in which someone attempts to deceive other computer networks by using a computer, device, or network to identify themselves as a legitimate entity.

  Report Error

Please Enter Message
Error Reported Successfully

  Report Error

Please Enter Message
Error Reported Successfully

  Report Error

Please Enter Message
Error Reported Successfully

  Report Error

Please Enter Message
Error Reported Successfully

  Report Error

Please Enter Message
Error Reported Successfully

  Report Error

Please Enter Message
Error Reported Successfully

  Report Error

Please Enter Message
Error Reported Successfully

  Report Error

Please Enter Message
Error Reported Successfully