0% found this document useful (0 votes)
23 views

Comuter Network Copy

This document is a question bank for the Computer Network subject for the Mar 2022 examination at Shivaji University, Kolhapur. It includes multiple-choice questions covering various topics such as data communication methods, OSI model layers, network topologies, routing algorithms, and cryptography. Additionally, it contains descriptive questions that require detailed explanations on networking concepts and protocols.

Uploaded by

ahajang141
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views

Comuter Network Copy

This document is a question bank for the Computer Network subject for the Mar 2022 examination at Shivaji University, Kolhapur. It includes multiple-choice questions covering various topics such as data communication methods, OSI model layers, network topologies, routing algorithms, and cryptography. Additionally, it contains descriptive questions that require detailed explanations on networking concepts and protocols.

Uploaded by

ahajang141
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Shivaji University, Kolhapur

Question Bank for Mar 2022 (summer) Examination

Subject Code :_____ 81986 _________Subject Name : ___ Computer Network


_____________________
Common subject Code (if any) ______________________________________
--------------------------------------------------------------------------------------------

1] In_______ data communication method is used to transmit the data over a serial
communication link
a] Simplex
b] Half-duplex
c] Full duplex
d] All of above

2] The OSI model has ________ layers.


a] 5
b] 6
c] 7
d] 8

3] Which of the following transmission directions listed is not a legitimate channel?

a] Simplex
b] Half duplex
c] Full duplex
d] Double duplex

4] Which type of topology is best suited for large businesses which must carefully control and
coordinate the operation of distributed branch outlets?
a] Ring
b] Local area
c] Hierarchical
d] star

5] The topology with highest reliability is __________

a] Bus topology
b] Star topology
c] Ring Topology
d] Mesh Topology
6] ___________ layer is concerned with syntax and semantics of the information transmitted in
OSI/ISO model.

a] Presentation
b] Application
c] Session
d] Data link

7] What kind of transmission medium is most appropriate to carry data in a computer network
that is exposed to electrical interferences?

a] unshielded twisted pair


b] Optical fiber
c] Coaxial cable
d] microwave

8] _________ are advantages of wireless LAN


a] Convenience
b] Mobility
c] Both Convenience and Mobility
d] None of These

9] Which of the following cannot be used as a medium for 802.3 Ethernet?

a] Thin coaxial cable


b]twisted pair
c] Microwave link
d] fiber optical cable

10] ----is also a static algorithm in which every incoming packet is sent out on every outgoing
line except the one it arrives on.

a] Shortest Path Algorithm


b] Flooding
c] Distance Vector Routing
d] Hierarchical Routing

l1] In _______ data is hidden behind picture.


a] Substitution
b] Stenography
c] Transposition
d] one time pad

12] __________ allows addressing of packets to all destinations


a] Multitasking
b] Broadcasting
c] Hierarchical
d] Unitasking

13] __________ factors cause congestion.


a] Insufficient memory
b] Busty Traffic
c] Slow processor
d] All of these

14] To join the internet, the computer has to be connected to a

a] internet architecture board


b]) internet society
c] internet service provider
d] none of the mentioned

15] Internet works on

a] packet switching
b] circuit switching
c] both packet switching and circuit switching
d]none of the mentioned

16] In this topology there is a central controller or hub

a] Star
b] Mesh
c] Ring
d] Bus

17] What is a web browser?

a] a program that can display a web page


b] a program used to view html documents
c] it enables user to access the resources of internet
d] all of the mentioned

18] For a connection oriented service, we need a _________

a] Virtual circuit subnet


b] Short circuit subnet
c] Datagram subnet
d] Wireless subnet

19] Repeater functions in the ________ layer.

a] Physical
b] data link layer
c] Network
d] None
20] In _________, each packet of a message need not follow the same path from sender to
receiver.

a] Circuit switching
b] Message switching
c] Virtual approach to packet switching
d] Datagram approach to packet switching

21] Which of the following routing algorithm takes into account the current network load?

a] Broadcast
b] Shortest path
c] Flooding
d] Distance vector routing

22] Upon receipt of a bad segment, UDP _________

a] it does flow control


b] It does error control
c] Retransmission
d] It does not do flow and error control

23] Flow control policy is implemented in __________

a] Network layer
b] Transport layer
c] Application layer
d] Physical layer

24] the design issue of Data link Layer in OSI Reference Model is

a] Framing
b] Representation of bits
c] Synchronization of bits
d] Connection control

25] Sending of a IP packet from host 1 to host 2 where both are of same LAN but the packet is
transferred through different intermediate called _________

a] Tunneling
b] Routing
c] Diverting
d] Forwarding

26] In shortest path routing algorithm, the path length is measured based on _________

a] Time delay
b] Number of hops
c] Size of the routers
d] Routing table
27] In which routing method do all the routers have a common database?

a] Distance Vector
b] Link Vector
c] Shortest path
d] Link State

28] The regions in Hierarchical routing are grouped in to ________

a] Clusters
b] Zones
c] Blocks
d] Cells

29] Packet discard policy is implemented in _________

a] Physical layer
b] Data link layer
c] MAC layer
d] Network layer

30] The solution to increase the capacity when congestion occurs is __________

a] Denying service to the users


b] Degrading the service to the users
c] Splitting traffic over multiple routes
d] Rescheduled the demands of the users

31] FDDI stands for

a] Fiber Distributed Data Interface


b] Fiber Data Distributed Interface
c] Fiber Dual Distributed Interface
d] Fiber Distributed Data Interface

32] Which of the following is an application layer service?


a] Network virtual terminal
b]File transfer, access and management
c] Mail service
d] All of the above

33] TCP/IP.................. layer corresponds to the OSI models to three layers.


a] Application
b] Presentation
c] Session
d] Transport

34] Which of the transport layer protocols is connectionless?


a] UDP
b] TCP
c] FTP
d] Nvt
35] Which algorithm provides the private key and its corresponding public key?

a]Key generation algorithm


b] Signature verifying algorithm
c] Signing algorithm
d] None of the above

36]A firewall need to be--------so that it can be grow proportionally with the network that it
protects.

a] Robust
b] Expensive
c] Fast
d] Scalable

37] A packet filter firewall filter at--------------------

a]Physical layer
b] data link layer
c]Network layer or transport layer
d]application layer

38] The data unit in the TCP/IP layer called a.....


a] Message
b] Segment
c] Datagram
d] Frame

39] Public key cryptography is a ... cryptosystem

a] Symmetric
b] Asymmetric
c] Symmetric and asymmetric
d] none

40] A mechanism used to encrypt and decrypt data.

a] Cryptography
b] Algorithm
c] Data flow
d] None of these

Descriptive Questions

1. What is network? Explain different applications of networking.


2. Explain different network topologies with suitable diagrams.
3. What is OSI reference model? Explain different layers of OSI model.
4. Explain TCP/IP protocol suite.
5. Differentiate between OSI reference model and TCP/IP model.
6. Write a short note on telephone network.
7. What is Asynchronous and synchronous transmission? Explain in detail with suitable
diagram.
8. Differentiate between Asynchronous and synchronous transmission.
9. Write a note on guided transmission media.
10. Write a note on un- guided transmission media.
11. What are the service primitives?
12. Differentiate between Connection-oriented and connectionless Services.
13. Differentiate between TCP and UDP.
14. Write a note on Layered network architecture.
15. Explain LAN, MAN and WAN.
16. What is switching? Explain the types of switching techniques.
17. Differentiate between message switching and packet switching.
18. What is router? Explain packet routing in the network
19. What is optimality principle? Explain with neat diagram.
20. Explain the optimality principle.
21. Explain shortest path routing with example.
22. Write a note on flooding.
23. Elaborate distance vector routing algorithm.
24. Elaborate link-state routing algorithm.
25. Elaborate hierarchical routing algorithm.
26. Elaborate broadcast routing.
27. What is Congestion control? Explain its prevention policies.
28. Write a note on hierarchical routing and broadcast routing.
29. Write a note in Distance Vector Routing and Link State Routing.
30. Write a note on Network Protocols.
31. Explain different goals of Layered Protocols.
32. Discuss Network Design problems.
33. Explain services of all layers in OSI model.
34. Explain Token Ring with neat diagram.
35. Explain Token Bus with neat diagram.
36. Elaborate Token passing (priority systems).
37. Write a note on FDDI.
38. Write a note on TCP/IP protocols.
39. Explain IP address and major features of IP.
40. Write a note on TCB (transmission control blocks).
41. Write a note on IP datagram.
42. What is the need of network security?
43. Explain Bit rate, bit length, base band transmission.
44. What is Cryptography? Explain types of cryptography.
45. Explain symmetric and asymmetric cryptography.
46. Explain public key signature.
47. Explain message digest.
48. Write a note on web security.
49. Write a note on wireless security.
50. Write a note on email security.
51. What is Authentication? Explain in detail any two authentication protocols.
52. What is firewall? Explain types of firewall.
53. Write a note on virtual private networks (VPN).
54. Explain digital signature.
55. What are the applications of cryptography?
56. Explain SSL in detail.
57. Explain radio waves, microwaves, infrared rays.
58. Differentiate between symmetric and asymmetric cryptography.
59. Explain Asymmetric key in detail.
60. Explain Symmetric key in detail.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy