0% found this document useful (0 votes)
16 views9 pages

Sol Moderate Level Networking

The document contains a series of multiple-choice questions and answers related to networking, topologies, and protocols. Key topics include DNS functions, email protocols like SMTP and MIME, the OSI model, IP addressing, and networking technologies. Each question is followed by the correct answer, providing a concise overview of essential networking concepts.

Uploaded by

anand
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views9 pages

Sol Moderate Level Networking

The document contains a series of multiple-choice questions and answers related to networking, topologies, and protocols. Key topics include DNS functions, email protocols like SMTP and MIME, the OSI model, IP addressing, and networking technologies. Each question is followed by the correct answer, providing a concise overview of essential networking concepts.

Uploaded by

anand
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Ques.

Based on NETWORKING, TOPOLOGIES AND PROTOCOLS

1.What is the primary function of DNS?

A) DNS translates IP addresses to domain names

B) DNS translates domain names to IP addresses

C) DNS translates domain names to MAC addresses

D) DNS manages network routing

Ans:B

2. What is the purpose of using the “nslookup” commands in the


Windows Command Prompt?
A) nslookup is used to retrieves the MAC address of the System
B) nslookup retrieves the IP address of a domain name
C) nslookup checks server uptime
D) nslookup modifies DNS records
Ans:B

3.Which of the following correctly describes the characteristics of


SMTP and MIME in email communication?
A) SMTP is out-of-band protocols used for text-only email, while MIME
is used for non-text content.

B) SMTP is in-band protocols used for text-only email, while MIME


enables support for non-text content.

C) SMTP is in-band protocols used for non-text content, while MIME is


used for text-only email.

D) SMTP is out-of-band protocols used for both text and non-text


content, while MIME is used for text-only email.

Ans:B

4.What is the full form of the OSI model, developed by ISO in 1984?

A) Open System Interface, International Standards Organization

B) Open Systems Interconnection, International Organization for


Standardization

C) Open Systems Interconnection,International Standardization of


Organization

D) Open Source Interconnection, International System Organization

Ans:B

5.Which of the following correctly identifies the two sublayers of the


Data Link Layer in the OSI model?
A) LLC (Logical Link Control) and MAC (Media Access Control)

B) LLC (Link Layer Control) and MAC (Message Access Control)

C) LLC (Logical Link Connection) and MAC (Media Authentication


Control)

D) LLC (Link Layer Communication) and MAC (Media Access


Coordination)

Ans:A

6.Which of the following not correctly matches the data units with
their corresponding OSI model layer?

A) Application Layer: Bits

B) Transport Layer: Segment

C) Network Layer: Packets

D) Data Link Layer: frames

Ans:A

7.Which of the following not correctly matches the OSI model layers
with their corresponding networking device?

A) Application Layer: Gateway


B) Network Layer: Router

C) Data Link Layer: Hub

D) Physical Layer: Repeater

Ans:C

8.Which of the following not correctly matches the OSI model layers
with their primary functions?

A) Data Link Layer: Flow control, error control.

B) Transport Layer: compression, Bit synchronization.

C) Presentation Layer: decryption, encryption.

D) Session Layer: Session management, dialog control.

Ans:B

9.Which of the following correctly matches the OSI model layer with
their associated protocols?

A) Network Layer: ARP, RARP;

B) Transport Layer: TCP, UDP;

C) Application Layer: POP, SMTP;

D) Physical Layer: MIME, DNS;


Ans:D

10.Which of the following options contains an incorrect IEEE standard


and technology pairing?

A) IEEE 802.2: Ethernet

B) IEEE 802.5: Token Ring

C) IEEE 802.15.1: Bluetooth

D) IEEE 802.4: Token Bus

Ans:A

11. Which of the following range of IP address classes A, B, C, and D in


IPv4 addressing is not correct?
A) Class A: 0.0.0.0 to 127.255.255.255
B) Class B: 128.0.0.0 to 191.255.255.255
C) Class C: 192.0.0.0 to 223.255.255.255
D) Class D: 224.0.0.0 to 240.255.255.255
Ans:D

12.Which of the following is a private IP address reserved by IANA?


A) 10.0.0.0 – 10.255.255.255
B) 122.16.0.0 – 122.31.255.255
C) 100.168.0.0 – 100.168.255.255
D) 164.254.0.0 – 164.254.255.255
Ans:A

13.Which of the following IP address is reserved for loopback


addresses in IPv4?
A) 127.0.0.1
B) 192.168.0.0
C) 169.254.0.0
D) 224.0.0.0
Ans:A

14.Who were primarily responsible for the development of IPv4 and


IPv6 protocols?
A) W3C and ISO
B) ARPANET and ITU
C) DARPA and IETF
D) IEEE and ICANN
Ans:C
15.Which of the following methods can be used to change your IP
address?
A) Switching networks or connecting through a VPN
B) Resetting your modem or contacting the Internet Service Provider
(ISP) can request a change
C) VPNs and proxy servers mask your real IP with another
D) All of the above
Ans:D

16.Which class of IP addresses does not use the concept of network


and host IDs?
A) Class A
B) Class B
C) Class C
D) Class D
Ans:D

17.Which of the following correctly matches the full forms of PAN and
SAN?
A) PAN: Private Area Network, SAN: Storage Access Network
B) PAN: Personal Area Network, SAN: Secure Area Network
C) PAN: Portable Area Network, SAN: Secure Access Network
D) PAN: Personal Area Network, SAN: Storage Area Network
Ans:D
18.What is the primary use of a coaxial cable, which has a single
copper core with shielding?
A) Used in electric equipment
B) Used for high-speed internet
C) Used in televisions (TVs)
D) Used in phone lines
Ans: C

19. In a mesh topology, what is the total number of possible wired


connections required to fully connect N nodes?
A) N
B) N(N-1)/2
C) N(N+1)/2
D) N-1
Ans:B

20.On which technology does the Bluetooth works?


A) Microwave
B) Radio Frequency
C) Fiber Optics
D) Electromagnetic waves (EMI waves)
Ans:A

You might also like