Online Assessment Platform

ALL THE BEST!!!

ALL THE BEST!!!


COMPUTER HWNW- EFC CHENNAI - DEC BATC 2-28TH JAN 2025

1 / 50

Which of the following is a layer-3 device?

2 / 50

State the following statement is true or false.

i) In class B addresses a total of more than 1 billion
addresses can be formed.

ii) Class E addresses are reserved for future or experimental use.

3 / 50

The performance of data communications network depends on ..............

4 / 50

Devices on one network can communicate with devices on another network via a .......

5 / 50

Ethernet system uses which of the following technology.

6 / 50

Which protocol is used to send emails?

7 / 50

The computer network is

8 / 50

Which of the following OSI layers correspond to TCP/IP's application layer?

9 / 50

FDDI used which type of physical topology?

10 / 50

address use 7 bits for the and 24 bits for the portion of the IP address.

11 / 50

What is the binary equivalent of the decimal number 10?

12 / 50

FTP stands for

13 / 50

..........is a combination of hardware and software that facilitates the sharing of information between computing devices.

14 / 50

Which layers of the OSI determines the interface often system with the user?

15 / 50

Which device amplifies and regenerates signals in a network?

16 / 50

In mesh topology, relationship between one device and another is .............

17 / 50

What is a subnet mask used for?

18 / 50

What is a VLAN?

19 / 50

The layer one of the OSI model is

20 / 50

The performance of data communications network depends on ..............

21 / 50

What is the primary purpose of a proxy server?

22 / 50

The first computers were programmed using

23 / 50

What is the purpose of ARP?

24 / 50

The name of the protocol which provides virtual terminal in TCP/IP model is.

25 / 50

While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part.................to the SSL code on the server.

26 / 50

The computer network is

27 / 50

Which protocol is used for file transfer over the internet?

28 / 50

Find out the OSI layer, which performs token management.

29 / 50

...................mode is used whenever either end of a security association is gateway.

30 / 50

Coded entries which are used to gain access to a computer system are called

31 / 50

Which of the following statements is true?

32 / 50

addresses are reserved for multicasting.

33 / 50

Which of the following is not the layer of TCP/IP protocol?

34 / 50

Which of the following are the network services?

35 / 50

Which of the following is NOT a peripheral device?

36 / 50

State whether the following statement are true.

i) An application-level gateway is often referred to as
a proxy.

ii) In proxy, a direct connection is established between the client and destination server.

37 / 50

The layer one of the OSI model is

38 / 50

Which of the following controls the process of interaction between the user and the operating system?

39 / 50

What does the traceroute command do?

40 / 50

What does SSD stand for?

41 / 50

DNS can obtain the ..................of host if its domain name is known and vice versa.

42 / 50

Find out the OSI layer, which performs token management.

43 / 50

On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called
the …………………

44 / 50

A communication device that combines transmissions from several I/O devices into one line is a

45 / 50

What is the main advantage of an SSD over an HDD?

46 / 50

What is the name of the network topology in which there are bi-directional links between each possible node?

47 / 50

What is the speed of a standard Ethernet network?

48 / 50

The name of the protocol which provides virtual terminal in TCP/IP model is.

49 / 50

Which of the following statement is true?

i) An address with all bits 1 is interpreted as all networks
or all hosts.

ii) The class A network 128.0.0.0 is defined as the loopback network.

50 / 50

Which protocol is used for secure web browsing?