ALL THE BEST!!!
COMPUTER HWNW- EFC CHENNAI - DEC BATC 2-28TH JAN 2025
1 / 50
Which of the following is a layer-3 device?
2 / 50
State the following statement is true or false.
i) In class B addresses a total of more than 1 billionaddresses can be formed.
ii) Class E addresses are reserved for future or experimental use.
3 / 50
The performance of data communications network depends on ..............
4 / 50
Devices on one network can communicate with devices on another network via a .......
5 / 50
Ethernet system uses which of the following technology.
6 / 50
Which protocol is used to send emails?
7 / 50
The computer network is
8 / 50
Which of the following OSI layers correspond to TCP/IP's application layer?
9 / 50
FDDI used which type of physical topology?
10 / 50
address use 7 bits for the and 24 bits for the portion of the IP address.
11 / 50
What is the binary equivalent of the decimal number 10?
12 / 50
FTP stands for
13 / 50
..........is a combination of hardware and software that facilitates the sharing of information between computing devices.
14 / 50
Which layers of the OSI determines the interface often system with the user?
15 / 50
Which device amplifies and regenerates signals in a network?
16 / 50
In mesh topology, relationship between one device and another is .............
17 / 50
What is a subnet mask used for?
18 / 50
What is a VLAN?
19 / 50
The layer one of the OSI model is
20 / 50
21 / 50
What is the primary purpose of a proxy server?
22 / 50
The first computers were programmed using
23 / 50
What is the purpose of ARP?
24 / 50
The name of the protocol which provides virtual terminal in TCP/IP model is.
25 / 50
While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part.................to the SSL code on the server.
26 / 50
27 / 50
Which protocol is used for file transfer over the internet?
28 / 50
Find out the OSI layer, which performs token management.
29 / 50
...................mode is used whenever either end of a security association is gateway.
30 / 50
Coded entries which are used to gain access to a computer system are called
31 / 50
Which of the following statements is true?
32 / 50
addresses are reserved for multicasting.
33 / 50
Which of the following is not the layer of TCP/IP protocol?
34 / 50
Which of the following are the network services?
35 / 50
Which of the following is NOT a peripheral device?
36 / 50
State whether the following statement are true.
i) An application-level gateway is often referred to asa proxy.
ii) In proxy, a direct connection is established between the client and destination server.
37 / 50
38 / 50
Which of the following controls the process of interaction between the user and the operating system?
39 / 50
What does the traceroute command do?
40 / 50
What does SSD stand for?
41 / 50
DNS can obtain the ..................of host if its domain name is known and vice versa.
42 / 50
43 / 50
On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, calledthe …………………
44 / 50
A communication device that combines transmissions from several I/O devices into one line is a
45 / 50
What is the main advantage of an SSD over an HDD?
46 / 50
What is the name of the network topology in which there are bi-directional links between each possible node?
47 / 50
What is the speed of a standard Ethernet network?
48 / 50
49 / 50
Which of the following statement is true?
i) An address with all bits 1 is interpreted as all networksor all hosts.
ii) The class A network 128.0.0.0 is defined as the loopback network.
50 / 50
Which protocol is used for secure web browsing?