ALL THE BEST!!!
COMPUTER HWNW- EFC CHENNAI - DEC BATC 2-28TH JAN 2025
1 / 50
What is the primary purpose of a proxy server?
2 / 50
Which device amplifies and regenerates signals in a network?
3 / 50
Which layers of the OSI determines the interface often system with the user?
4 / 50
What is the main advantage of an SSD over an HDD?
5 / 50
Which protocol is used for secure web browsing?
6 / 50
On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, calledthe …………………
7 / 50
Which protocol is used for file transfer over the internet?
8 / 50
FTP stands for
9 / 50
The computer network is
10 / 50
Coded entries which are used to gain access to a computer system are called
11 / 50
address use 7 bits for the and 24 bits for the portion of the IP address.
12 / 50
Which protocol is used to send emails?
13 / 50
What is a subnet mask used for?
14 / 50
Find out the OSI layer, which performs token management.
15 / 50
The layer one of the OSI model is
16 / 50
Ethernet system uses which of the following technology.
17 / 50
The first computers were programmed using
18 / 50
Which of the following controls the process of interaction between the user and the operating system?
19 / 50
The name of the protocol which provides virtual terminal in TCP/IP model is.
20 / 50
DNS can obtain the ..................of host if its domain name is known and vice versa.
21 / 50
What is the binary equivalent of the decimal number 10?
22 / 50
23 / 50
24 / 50
Devices on one network can communicate with devices on another network via a .......
25 / 50
State whether the following statement are true.
i) An application-level gateway is often referred to asa proxy.
ii) In proxy, a direct connection is established between the client and destination server.
26 / 50
What is the purpose of ARP?
27 / 50
Which of the following is a layer-3 device?
28 / 50
FDDI used which type of physical topology?
29 / 50
Which of the following statement is true?
i) An address with all bits 1 is interpreted as all networksor all hosts.
ii) The class A network 128.0.0.0 is defined as the loopback network.
30 / 50
State the following statement is true or false.
i) In class B addresses a total of more than 1 billionaddresses can be formed.
ii) Class E addresses are reserved for future or experimental use.
31 / 50
What is the name of the network topology in which there are bi-directional links between each possible node?
32 / 50
...................mode is used whenever either end of a security association is gateway.
33 / 50
Which of the following is NOT a peripheral device?
34 / 50
..........is a combination of hardware and software that facilitates the sharing of information between computing devices.
35 / 50
What does the traceroute command do?
36 / 50
What is the speed of a standard Ethernet network?
37 / 50
The performance of data communications network depends on ..............
38 / 50
39 / 50
In mesh topology, relationship between one device and another is .............
40 / 50
Which of the following OSI layers correspond to TCP/IP's application layer?
41 / 50
Which of the following are the network services?
42 / 50
43 / 50
What is a VLAN?
44 / 50
While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part.................to the SSL code on the server.
45 / 50
What does SSD stand for?
46 / 50
A communication device that combines transmissions from several I/O devices into one line is a
47 / 50
48 / 50
addresses are reserved for multicasting.
49 / 50
Which of the following statements is true?
50 / 50
Which of the following is not the layer of TCP/IP protocol?