Data communication and networking Practice Question and Answer
8 Q: The company has a large network which is divided into smaller parts. By using which device LAN can be divided into different parts?
822 063e62de99353301b5ccd84f8
63e62de99353301b5ccd84f8- 1an internal firewallfalse
- 2router between subnetsfalse
- 3individual switch for departmentfalse
- 4all of the abovetrue
- Show Answer
- Workspace
- SingleChoice
Answer : 4. "all of the above"
Q: Which of the following devices tells the difference between multicast and unicast packets?
787 063e62d0b6149271af9b8c4c7
63e62d0b6149271af9b8c4c7- 1multicast switchtrue
- 2developedfalse
- 3advanced routerfalse
- 4multicast routerfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 1. "multicast switch"
Explanation :
Multicast switch
Q: Which data transport medium has the highest data transfer rate?
744 064ba711888d5e4f52de3b7da
64ba711888d5e4f52de3b7da- 1Twisted Cablefalse
- 2Co-Axial Cablefalse
- 3Optical Fibertrue
- 4None of thesefalse
- Show Answer
- Workspace
- SingleChoice
Answer : 3. "Optical Fiber"
Explanation :
1. Optical fibres use total internal reflection to transfer data. The primary condition for total internal reflection is that the signal must travel from an optically denser medium to an optically rarer medium. Secondly, the angle of incidence must be greater than the critical angle.
Q: Which subnet is used for LAN security to bring stability in the Internet network?
723 063e62d813c221e1b4dbd9282
63e62d813c221e1b4dbd9282- 1static routertrue
- 2dynamic routerfalse
- 3static switchfalse
- 4dynamic switchfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 1. "static router"
Q: Which of the following methods is used to secure and protect sensitive data on computer systems?
709 06493fcedab3c5fffc2cc5018
6493fcedab3c5fffc2cc5018- 1encryptiontrue
- 2Defragmentationfalse
- 3Formattingfalse
- 4rebootingfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 1. "encryption"
Explanation :
1. Encryption is the process of encoding data in cryptography.
2. This process transforms the plaintext or original representation of data into ciphertext or alternative representation of the data.
3. Only authorized parties should be able to decipher the ciphertext back into plaintext and access the original data.
4. Encryption in itself does not prevent interference, but it hinders interceptors from deciphering the content.
Q: The full name of FTP is:
686 064a52ef89a74b54cff5823ad
64a52ef89a74b54cff5823ad- 1File Transfer Protocoltrue
- 2Fast Trans Travel Protocolfalse
- 3File Tracking Protocolfalse
- 4File transfer processfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 1. "File Transfer Protocol"
Explanation :
1. The full name of FTP is File Transfer Protocol.
2. It is a network protocol used to transfer files between two computers.
3. FTP is a two-way protocol, which means both computers can send and receive files from each other.
4. FTP runs in two main modes-
- Unprotected Mode: This mode transfers files without any protection.
- Secure Mode: This mode uses encryption to transfer files using SSL or TLS.
Q: What is the complete form of Upi?
658 064b9143ca2d4dcaf04387221
64b9143ca2d4dcaf04387221- 1Unified Payment Interfacetrue
- 2Unified Pay Interfacefalse
- 3Uniform Payment Interfacefalse
- 4None of the abovefalse
- Show Answer
- Workspace
- SingleChoice
Answer : 1. "Unified Payment Interface"
Explanation :
1. UPI (Unified Payments Interface): UPI is a mobile-based payment system that allows users to transfer money from their bank accounts to any other bank account instantly and securely.
2. As a UPI user, you have to create a unique identifier called UPI ID. It is linked to your bank account. With its help, money can be easily sent and received from the bank account. For this, you do not need to share your account number or other information.
Q: Junk e-mail is called:
650 064a540acb394764d11b18bdf
64a540acb394764d11b18bdf- 1Spamtrue
- 2Spooffalse
- 3Sniffer scriptfalse
- 4Spoolfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 1. "Spam"
Explanation :
1. Junk email is called spam. Spam is an email that you did not request, and which usually promotes advertising or other unwanted content.
2. Spoofing is a special type of cyber-attack in which someone attempts to deceive other computer networks by using a computer, device, or network to identify themselves as a legitimate entity.