Data communication and networking Practice Question and Answer
8 Q: The company has a large network which is divided into smaller parts. By using which device LAN can be divided into different parts?
956 063e62de99353301b5ccd84f8
63e62de99353301b5ccd84f8- 1an internal firewallfalse
- 2router between subnetsfalse
- 3individual switch for departmentfalse
- 4all of the abovetrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "all of the above"
Q: Which of the following devices tells the difference between multicast and unicast packets?
947 063e62d0b6149271af9b8c4c7
63e62d0b6149271af9b8c4c7- 1multicast switchtrue
- 2developedfalse
- 3advanced routerfalse
- 4multicast routerfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "multicast switch"
Explanation :
Multicast switch
Q: Which data transport medium has the highest data transfer rate?
906 064ba711888d5e4f52de3b7da
64ba711888d5e4f52de3b7da- 1Twisted Cablefalse
- 2Co-Axial Cablefalse
- 3Optical Fibertrue
- 4None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 3. "Optical Fiber"
Explanation :
1. Optical fibres use total internal reflection to transfer data. The primary condition for total internal reflection is that the signal must travel from an optically denser medium to an optically rarer medium. Secondly, the angle of incidence must be greater than the critical angle.
Q: Which subnet is used for LAN security to bring stability in the Internet network?
868 063e62d813c221e1b4dbd9282
63e62d813c221e1b4dbd9282- 1static routertrue
- 2dynamic routerfalse
- 3static switchfalse
- 4dynamic switchfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "static router"
Q: Which of the following methods is used to secure and protect sensitive data on computer systems?
849 06493fcedab3c5fffc2cc5018
6493fcedab3c5fffc2cc5018- 1encryptiontrue
- 2Defragmentationfalse
- 3Formattingfalse
- 4rebootingfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "encryption"
Explanation :
1. Encryption is the process of encoding data in cryptography.
2. This process transforms the plaintext or original representation of data into ciphertext or alternative representation of the data.
3. Only authorized parties should be able to decipher the ciphertext back into plaintext and access the original data.
4. Encryption in itself does not prevent interference, but it hinders interceptors from deciphering the content.
Q: What is the complete form of Upi?
834 064b9143ca2d4dcaf04387221
64b9143ca2d4dcaf04387221- 1Unified Payment Interfacetrue
- 2Unified Pay Interfacefalse
- 3Uniform Payment Interfacefalse
- 4None of the abovefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Unified Payment Interface"
Explanation :
1. UPI (Unified Payments Interface): UPI is a mobile-based payment system that allows users to transfer money from their bank accounts to any other bank account instantly and securely.
2. As a UPI user, you have to create a unique identifier called UPI ID. It is linked to your bank account. With its help, money can be easily sent and received from the bank account. For this, you do not need to share your account number or other information.
Q: The full name of FTP is:
815 064a52ef89a74b54cff5823ad
64a52ef89a74b54cff5823ad- 1File Transfer Protocoltrue
- 2Fast Trans Travel Protocolfalse
- 3File Tracking Protocolfalse
- 4File transfer processfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "File Transfer Protocol"
Explanation :
1. The full name of FTP is File Transfer Protocol.
2. It is a network protocol used to transfer files between two computers.
3. FTP is a two-way protocol, which means both computers can send and receive files from each other.
4. FTP runs in two main modes-
- Unprotected Mode: This mode transfers files without any protection.
- Secure Mode: This mode uses encryption to transfer files using SSL or TLS.
Q: Junk e-mail is called:
766 064a540acb394764d11b18bdf
64a540acb394764d11b18bdf- 1Spamtrue
- 2Spooffalse
- 3Sniffer scriptfalse
- 4Spoolfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Spam"
Explanation :
1. Junk email is called spam. Spam is an email that you did not request, and which usually promotes advertising or other unwanted content.
2. Spoofing is a special type of cyber-attack in which someone attempts to deceive other computer networks by using a computer, device, or network to identify themselves as a legitimate entity.

