0% found this document useful (0 votes)
28 views45 pages

It & Cyber Security

The document contains a series of multiple-choice questions related to web design, networking, and computer systems. It covers topics such as web design applications, protocols, network topologies, and hardware components. Each question provides options for answers, testing knowledge in IT concepts and terminology.

Uploaded by

uttampatil250793
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views45 pages

It & Cyber Security

The document contains a series of multiple-choice questions related to web design, networking, and computer systems. It covers topics such as web design applications, protocols, network topologies, and hardware components. Each question provides options for answers, testing knowledge in IT concepts and terminology.

Uploaded by

uttampatil250793
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 45

IT

1. ________________is a full-featured Web design application that provides


you with all the tools you need to create your own Web page or Web site and get
it on to the Web.

a. Microsoft FrontPage
b. Web Designing
c. Web Publisher
d. Web Tool

2. FrontPage is a "______________" web Editor.

a. WYSIWYG
b. WYISWYG
c. WYGSIWY
d. WSIWYGY

3. The ____________ and __________ toolbar are displayed by default in


MS Front Page.

a. Menu and Drawing


b. Standard and Formatting
c. Formatting and Menu
d. Menu and Standard

4. The background color change option comes under _______ menu in MS


Front Page.

a. Insert
b. Format
c. Tool
d. Edit

5. The Hit counter starts from _______ in web designing.

a. One
b. Zero
c. One to One
d. Zero to One

6. Hit Counter option comes under _______ sub Menu.

a. Insert
b. Web Component
c. Tool
d. Picture
7. Creating a ___________is an easy way to add animation to your web
without any scripting.

a. Hyperlink
b. Hover button
c. Moving Button
d. Web link Button

8. DHTML stands for______________________________.

a. Dynamic Hyper text markup language.


b. Dynamic Hyper tolls markup language.
c. Dynamic Hyperlink test mover language.
d. Dynamic Hyper net test markup language.

9. FrontPage 2000 is designed as a __________environment in fact and


enables multiple users to work on the site at the same time

a. Single author
b. Multi-author
c. No author
d. Non of them

10. In hyperlinks view allows you to manage the links on your pages in MS
front page.

a. True
b. False

11. A __________ copies all the files on the system—the system files, the
software files, and the data files

a. Full back up
b. half back up
c. Partial back up
d. Incremental back up

12. If your restoration program is saved as part of your backup copy, you
might be able to restore your data in a crisis

a. True
b. False

13. In MS front page __________ types of backup.


a. Two
b. Three
c. Four
d. One

14. Once the user successfully logs into Data View, Data View could change
the protocol to_______, thus avoiding the performance cost of SSL for all
subsequent requests in the session.

a. HTTP
b. HTML
c. WWW
d. IP Address

15. CMS Stands for____________________

a. Chip memory storage


b. Counted messaging system
c. Content management system
d. Counter memory system

16. ____________is a Content Management System which you can use to


build a web site.

a. Html
b. Plone
c. Http
d. World wide web

17. A Learning Management System (LMS) is a ___________application


through which learning content is delivered and managed.

a. Web based
b. Html based
c. Mulit language base
d. Software

18._______________Permits centralized course and learner administration to


better meet.

a. LMS
b. SMCC
c. CMS
d. Non of them
19._____________________ automated measurement and reporting.

a. LMS
b. SMCC
c. CMS
d. Non of them

20. ______________ is a cryptographic Internet protocol designed to secure


sensitive information that is transmitted via web browsers and web servers

a. DSL
b. SSL
c. IP & TCP
d. Non of the above

21. ___________encryption of communicated data is automatic once the


channel is enabled between the domains.

a. DSL
b. SSL
c. IP & TCP
d. Non of the above

22. ___________ is a database system that translates a computer's fully


qualified domain name into an IP address.

a. DNS
b. Ms Access
c. Gateway
d. Oracle

23. Reverse DNS (RDNS) translates an _________ address into a domain


name.

a. TCP
b. IP
c. Physical
d. MAC

24. ADDS stands for

a. Active Directory Domain Service


b. Address Directory detect service
c. Advance Drive detect system
d. Active directory directory service

25. A ___________is an internetworking system capable of joining together


two networks that use different base protocols.

a. Router
b. Gateway
c. Brouter
d. Hub

26. A ___________ is a link between two computer programs or systems


such as Internet Forums

a. Router
b. Gateway
c. Brouter
d. Hub

27. Every software can add from ________________tools.

a. Control Panel
b. Add remove programme
c. Administrative tool
d. Program

28. Enable __________ if you want to have a secure communication between


your e- mail sever and email clients.

a. Active directory
b. SPA
c. ADDP
d. Local Window Accounts

29. In mail server to increase the number of PTEs allocated on _____


systems.

a. 32 bit
b. 64 bit
c. 128 bit
d. 32 byte
30. A __________is a hardware device that handles an interface to a
computer network and allows a network-capable device to access that network

a. Gateway
b. Router
c. NIC
d. Bridge

31. ____________is a computer hardware component works both an OSI


layer 1 (physical layer) and layer 2 (data link layer) device,

a. LAN adapter
b. Router
c. HUB
d. Switch

32. MAC addresses are ________digit hexadecimal numbers.

a. 10
b. 12
c. 32
d. 48

33. MAC Addresses are ________ in length.

a. 48bits
b. 64bits
c. 32bits
d. 48 bytes

34. The second half of a MAC address represents the serial number assigned
to the adapter by the ______________.

a. Manufacture
b. internet standard body
c. Dealer identity
d. Non of them

35. The prefix ___________ indicates the manufacturer is Intel Corporation.

a. 00A0C9
b. 0A009C
c. 0C00AC
d. 00AC09

36. IP addressing works at the_________.


a. layer 1
b. layer 2
c. layer 3
d. Non of them

37. IP networks maintain a mapping between the IP address of a device and


its MAC address. This mapping is known as the __________.

a. ARB
b. ARP
c. Table
d. ARP Cache

38. There are _________ types of Twisted-pair copper wire are used.

Two
Three
Four
Five

39. UTP connectors are called _______ connector.

a. RJ-45
b. CAT-5
c. RJ-68
d. CAT-6

40. CAT5 cable supports Fast Ethernet speeds up to _________.

100 mbps
10 mbps
1000 mbps
100 mtr

41. Thin coaxial cable to the approximate actual fact the maximum segment
length is _________meters.

a. 185 mtrs
b. 200 mtrs
c. 100 mtrs
d. 1000 mtrs

42. Thick coaxial cable to the approximate actual fact the maximum segment
length is _________meters.

185 mtrs
200 mtrs
100 mtrs
500 mtrs

43. __________ used to connect multiple segments of the same network, and
transfer data from one segment to another.

a. Router
b. Switch
c. HUB
d. Firewall

44. There are _________types of HUB.

One
Two
Three
Four

45. ____________ hub does not regenerate or amplify the signal.

a. Active Hub
b. Passive hub
c. Hybrid hub
d. Both active and passive hub

46. Cut through switch after storing the __________that make up the address
information, they immediately begin sending the packet to the destination node.

a. 24 Bytes
b. 32 bytes
c. 06 bits
d. 6 bytes

47. A __________is a device that amplifies the incoming signals, creates a


new copy of it, and transmits the signal back on network.

a. Generater
b. Repeater
c. Switch
d. HUB

48. A ____________ is a device used to connect two networks using same or


different protocols

a. Router
b. Repeater
c. Switch
d. HUB

49. The ________does not originate any traffic of its own; like a repeater, it
only echoes what it hears from other stations.

a. Router
b. Bridge
c. Switch
d. HUB

50. ___________are set of rules that the computers on the network must
follow to communicate with each other

a. Derive Device
b. Protocols
c. OSI Model
d. Layer

51. A Local Area Network (LAN) is a _________ communication system


capable of interconnecting a large number of computers

a. Data
b. Digital
c. Data and Digital
d. All of the above

52. MAN is Covers larger area than LAN but smaller than WAN with an area
of ___ to _______kms.

a. 10 to 100
b. 2 to 100
c. 100 to 1000
d. upto 100

53. In _______topology no switches or repeaters are used.

a. BUS
b. Tree
c. Star
d. Ring

54. In _______topology easy to connect of computers.

a. BUS
b. Tree
c. Star
d. Ring

55. In _______topology point to point links to use connecting of PC.

a. BUS
b. Tree
c. Star
d. Ring

56. in __________ topology If the hub fails, the entire network fails.

a. BUS
b. Tree
c. Star
d. Ring

57. In _____________ topology there are at least two paths to and from every
node

a. BUS
b. Tree
c. Mesh
d. Ring

58. __________________is an industry standard suite of protocols providing


communications in a heterogeneous environment.

a. N NetBEUI.
b. IPX/SPX.
c. TCP/IP
d. Apple Talk.
59.____________provides a routable, enterprise networking protocol and access
to the worldwide internet and its resources

a. N NetBEUI.
b. IPX/SPX.
c. TCP/IP
d. Apple Talk.

60. _____________Determines where packets are routed based on their


destination addresses.

a. N NetBEUI.
b. IP
c. TCP
d. Protocol

61. IPv4 Addressing _______bit addresses.

32
64
12
24

62. Each “dotted decimal” is commonly called an octet contains_________


bits.

a. 08
b. 16
c. 24
d. 12

63. Class E net address are used for ___________

a. Multicast addressing.
b. Reserved for future
c. American Defense
d. Wide area Network
64. Range of class B network IDs:______________

a. 128.1-191.254
b. 192.0.1-223.255.254
c. 1-126
d. 224.1-255.1

65. ______________is the most common way to interface with Novell


Netware networks. It is a routable protocol.

a. NetBEUI.
b. IPX/SPX.
c. TCP/IP
d. Apple Talk.

66. ____________is small and efficient for the types of communications it was
designed for file and print sharing.

a. NetBEUI.
b. IPX/SPX.
c. TCP/IP
d. Apple Talk.

67. ___________is an enormous advantage to networks migrating from


NetWare to Windows NT, as it allows you to have your client’s only logon to the
Windows NT domain.

a. NetBEUI.
b. IPX/SPX.
c. TCP/IP
d. NW link.

68. ____________allows your Windows NT server to communicate with


Macintoshes on your network.

a. NetBEUI.
b. IPX/SPX.
c. TCP/IP
d. Apple Talk.
69. Newer jet direct modules allow you to communicate with the printer over
IPX or ___________.

a. NetBEUI.
b. IPX/SPX.
c. TCP/IP
d. NW link.

70. A ________ is a device that makes it possible for computers to


communicate over a telephone line.

a. Modem
b. Telephone
c. Microphone
d. Google talk

71. Modems can interface with___________.

RS 232
RS 234
RS 11
RJ 45

72. In modem each character is turned into a string of _______.

a. Bytes
b. Packets
c. Bits
d. Frame

73. In external modem there are __________ types of indicator in front panel.

a. 5
b. 6
c. 7
d. 4

74. When a modem is transmitting a data _________ led is glow.

TR
TD
SD
CS
75. Synchronous communication relies on a timing scheme coordinated
between two devices to separate groups of bits and transmit them in blocks
knows as ____________.

a. Bytes
b. Packets
c. Bits
d. Frame

76. By default, the Routing and Remote Access service (RAS) is not installed
automatically during the Windows Server 2003 installation.

a. True
b. False

77. The main server is at Army HQ which is maintained by ______________.

ASDS
AHCC
AHQ
AHWC

78. The Army HQ web site IP address is _______________.

131.1.11.41
130. 1.11.41
131.11.1.41
non of them

79. Evaluating the Cyber Security posture of own establishment is termed as


___________.

a. Internal Audit
b. External Audit
c. Third Party Audit
d. Cyber Security

80. ________________is a device or software application that monitors


network and/or system activities for malicious activities or policy violations.

IDS
NAC
IDPS
CS
81. _________________gain access to network traffic by connecting to a
network hub, network switch configured for port mirroring, or network tap.

a. HIDS
b. NIDS
c. IDS
d. DMZ

82. HIDS standard for ____________________________.

Host-Based Intrusion Detection System.


Host based internet detection system.
Host based information detection system.
Host Intrusion Detection Software.

83. ______________an installed software package which monitors a single


host for suspicious activity by analyzing events occurring within that host.

a. HIPS

b. WIPS

c. NBA

d. NIPS

CYBER SECURITY

84. The cost of computer crimes total about ______ billion rupees over the past five
year.
a. 500
b. 400
c. 300
d. 200

85 On third of those break-ins occurred besides the presence of a --------


(i) Firewall (ii) Computer (iii)Global (iv) None of them.

86. A more recent global study puts India at the top of global e-commerce security
-----
(i) Breaches (ii)Computer (iii)Global (iv) Firewall.

87. As per the survey ------percent of Indian companies has security breaches.
(i) 23 (ii)65 (iii)56 (iv) 76

88. Britain shared the second spot with Germany at 14% in ---------
(i) 2000 (ii) 2002 (iii)1999 (iv) 1998

89. According to study group reports 68 percent of all information ----- is internal in
any organization.
(i) Hacking (ii) Study (iii) Normal (iv) None of them

90. Through globally security is take very seriously many organization in India still
follow the _____ principal.
(i) Three Monkey (ii) Cyber Security (iii) Global Security (iv) Internal
Security

91. The security scenario in India is still at the basic level of _____
(i) Encryption (ii) Cryptographic (iii) Awareness (iv) Alertness

92. -----or the firewall is not enough protection.


(i) Cryptographic (ii) Encryption (iii) Algorithm (iv) Decryption

93. There are many ways to ----through a cryptographic system.


(i) Implementation (ii) Break (iii) Create (iv) None of them

94. There are many ways to break through a -------system


(i) Encryption (ii) Cryptographic (iii) Network (iv) Implementation

95. The side channel attacks is the ______ technology.


(i) Serendipity (ii) Tempest (iii) Mission (iv) Digital

96. Public key encryption system based on RSA/---------- & Hellman use key length of
more than 2048 bits
(i) SUPO (ii) GROUP (iii) Diffie (iv) Diffinate

97. In cyber security first try password consisting of ________character.


(i) 8 (ii) 10 (iii) 14 (iv) 20

98. The in put password until the command signal to the _____ is sent in cyber
security.
(i) Bell (ii) Buzzer (iii) Music (iv) Ring

99. The number of possible _________ to check is dramatically reduced.


(i) Values (ii) Numbers (iii) Qty (iv) None of them

100. A reality check since the logic analyzer is not infinitely precise but samples the
signals at its own ________ rate.
(i) Correct (ii) Control (iii) Limited (iv) Wrong

101. The fast system a single password attempt can be repeated _______ time.
(i) Multiple (ii) Single (iii) Double (iv) Triple

102. The mechanism is silly and no real ______ product in CS.


(i) Logic (ii) Precise (iii) Security (iv) Rate
103. Timing patterns could are veal useful _______ about internal working.
(i) Information (ii) Security (iii) Password (iv) Protection

104. Crypto analysis is a step-by-step process in which any little crumb of information
help the ______.
(i) Find (ii) Security (iii) Search (iv) Procedure

105. The pass phrase check is not designed well and there should be a lockout after a
number of unsuccessful/ effused _______ attempts.
(i) Login (ii) Password (iii)Security key (iv) None of them

106. At a _______ level the CPU consists of electrical circuits and can only functions if
they get power.
(i) Down (ii) Upper (iii) Lower (iv) Medium

107. During an idle loop, the CPU would exhibit a different pattern than when
executing ______ code.
(i) Another (ii) First (iii) Second (iv) Different

108. The electrical current is not the only way to convey information about an
otherwise closed_________.
(i) Operation (ii) System (iii) Process (iv)
Technology

109. The sound and vibration reveal information about ______ device.
(i) Electrical (ii) Mechanical (iii) Chemical (iv) None of them
110. There is something in the bit picture that can head to _________.
(i) Suspected (ii) Unknown (iii) Suspicious (iv)
Unsuspicious

111. Traffic analysis is a _______ tool and requires large amount of data.
(i) Statistical (ii) Admin Tool (iii) Accessories (iv)
Programming

112. The gentle techniques like timing or power analysis are not enough to fulfill an
attackers ________.
(i) Global (ii) International (iii) Goal (iv) World

113. Manipulating the voltage power supply used by computing equipment becomes
obvious____________.
(i) Attacker (ii) Target (iii) Friend (iv) Enemy

114. __________ is the very reason security systems should have a fail safe
operation.
(i)RDH-III (ii)RDH-II (iii)RDH-I (iv) RDH

115. RDH stands for ____________


(i)Remember Die Hard III (ii) Remember Die Hard II (iii) Remember Die
Hard I.

(iv) None of them


116. The failure of the protection mechanism should leave the rest of the system in a
______________ state.
(i)Secure (ii) Insecure (iii) Both of them (iv) Safety

117. __________ computing is a totally fresh approach to solving a security problem


specially breaking DES.
(i)Molecular (ii) Modular (iii) Turbulence (iv) None of
them.

118. _____________ crypto analysis is still an emerging field.


(i) Molecular (ii) Modular (iii) Moles (iv) Atomic

119. ___________is not a product nor it is a technology.


(i) Security (ii) Safety (iii) Protection (iv) Procedure

120. Security is process, which consist of policy ,procedure and __________.


(i) Product (ii) Training (iii) Protect (iv) Adopted

121. Public key encryption system based on RSA/Diffie& Hellman use key length of
more than 2048______.
(i) bit (ii) bits (iii) byte (iv) Nibble

122. IDS stads for:-


(i) Intrusion Detection System (ii) Intrusion Detection Switch
(iii) International Directory System (iv) Information Directory System

123. Hackers and virus are the attacks of modern ___________.


(i) Day network (ii) Night network (iii) One day network (iv) Every day
network

124. ______ and ______ are the attacks of modern day network.
(i) Virus and Warms (ii) Hackers and Virus (iii) Hackers and
Warm
(iv) Virus and Nano machine

125. cyber security is not surprising hence that security is becoming a new wave in
the______.
(i) Country (ii) Nation (iii) State (iv) International society.

126. The direct related to anti-virus software is the intrusion detection software
referred as
IDS or_____.
(i) DIS (ii) NIDS (iii) DES (iv) RAS

127. The purpose of security policies is to establish the requirement on which the rest
of the security process in _______.
(i) Code (ii)Structure (iii) Built (iv) Directory

128. Info security is becoming a new wave in the _______.


(i) Country (ii) Nation (iii) State (iv) International society.
129. Today computing system are sources of ______ radiation, and this radiation can
be intercepted with appropriate equipment.
(i) Electrical (ii) Electromagnetic (iii) Electronic (iv) None of them.

DS

1. Microsoft FrontPage
2. WYSIWYG
3. Standard and Formatting
4. Format
5. Zero
6. Web Component
7. Hover button
8. Dynamic Hyper test markup language.
9. Multi-author
10. True
11. Full back up
12. False
13. Three
14. HTTP
15. Content management system
16. Plone
17. Web based
18. Lms
19 Lms
20. . SSL
21. SSL
22. DNS
23. IP
24. Active Directory Directory Service
25. Gateway
26. Gateway
27. lAdd remove programme
28. SPA
29. 32 bit
30. NIC
31. LAN adapter
32. 12
33. 48bits
34. Manufacture
35. 00A0C9
36. layer 3
37. ARP Cache
38. Two
39. RJ-45
40. 100 mbps
41. 185 mtrs
42. 500 mtrs
43. HUB
44. Three
45. Passive hub
46. 6 bytes
47. Repeater
48. Router
49. Bridge
50. Protocols
51. Digital
52. 2 to 100
53. BUS
54. BUS
55. Ring
56. Star
57. Mesh
58. TCP/IP
59 TCP/IP
60. IP
61. 32
62. 08
63. Reserved for future
64. 128.1-191.254
65. IPX/SPX.
66. IPX/SPX.
67. NW link.
68. Apple Talk.
69. TCP/IP
70. Modem
71. RS 232
72. Bits
73. 7
74. SD
75. Frame
76. False
77. AHCC
78. 131.1.11.41
79. Internal Audit
80. IDS
81. NIDS
82. Host-Based Intrusion Detection System.
83. HIPS

CYBER SECURITY

84. 500
85 Firewall
86. Breaches
87. 23 (ii)65 (iii)56 (iv) 76
88. 2000
89. Hacking
90. Three Monkey
91. Awareness
92. Encryption
93. Break
94. Cryptographic
95. Tempest
96. Diffie
97. 8
98. Buzzer
99. Values
100. Limited

101. Single
102. Logic
103. Information
104. Security
105. Login
106. Lower
107. Another
108. System
109. Electrical
110. Suspicious
111. Statistical
112. Goal
113. Target
114. RDH-III
115. Remember Die Hard III
116. Secure
117. Molecular
118. Molecular
119. Security
120. Product
121. bits
122. Intrusion Detection System
123. Day network
124. Hackers and Virus
125. Country
126. NIDS
127. Built
128. Country
129. Electromagnetic
DS SUBJECTIVE QUESTION OF IT & CYBER SECURITY

1. What is front Page?


Ans (a) Front Page is a software called Web Authoring or Web Publishing
program.
(b) Enables you to create Web pages using a familiar Word processing
like interface including adding & formatting text, pictures, and other page
content using menus and toolbar buttons.
(c) Generates the corresponding HTML tags in the background.
(d) Not only helps you create Web pages but also maintains the
constantly changing structure of the site as a whole.
(e) Allow you to make changes in HTML view.
(f) Allows you to create variety of Web sites including -
(i) A personal Web site
(ii) A Small Business Site

2. Which type of Microsoft applications works in collaboration with


Front page?
Ans. (a) MS Office 2000
(b) Visual studio and Visual Source Safe(VSS)
(c) Visual Interdev
(d) Photo Draw
(e) MS Internet Explorer

3. What are the basic steps will help you plan your site?
Ans. (a) Define your target audience
(b) Organize your concepts and materials
(c) Create a directory structure
(d) Create a story board of the pages you intend to create
(e) Design and refine the look and feel of the site

4. Write down the technical aspects of LMS.


Ans. Most LMSs are web-based, built using a variety of development platforms,
like Java/J2EE, Microsoft .NET or PHP. They usually employ the use of a
database like MySQL, Microsoft SQL Server or Oracle as back-end. Although
most of the systems are commercially developed and have commercial
software licenses there are several systems that have an open-source license.
5. What are the features of Front page 2000.
Ans. (a) Front Page is a tool called Web Authoring or Web Publishing
program.
(b) Puts the power of web site creation in everyone’s hand.
(c) Enables you to create Web pages using a familiar Word processing
like interface including adding & formatting text, pictures, and other page
content using menus and toolbar buttons.
(d) Generates the corresponding HTML tags in the background.
(e) Not only helps you create Web pages but also maintains the
constantly changing structure of the site as a whole.
(f) Allow you to make changes in HTML view.
(g) Allows you to create variety of Web sites including -
(i) A personal Web site
(ii) A Small Business Site
6. Front page allow you to create Which type of web sites.
Ans (a) A personal web site.
(b) A Small Business Site
(c ) A Corporate Web site
(d) A Corporate Intranet
7. How to create a new Web?
Ans. (a) A template is a pre-designed page that can contain page settings,
formatting, and page elements. You can create your own page templates
so that you can create pages for your web quickly and consistently.
(b). Templates are very useful in a multiple-author environment
because they help authors create pages the same way.
(c) From the menu bar, select FileàNewàWeb.
(d) A dialog box opens showing a variety of templates for typical web
sites: aCustomer Support Web, a Personal Web, and a Project Web.
(e) There’s also a One Page Web, which you can use to create a
single page, and an Empty Web, which sets up a web structure but allows you
more control over the content of the individual pages.
(f) Front Page also provides wizards for its two most complex
templates, the Corporate Presence Web and the Discussion Web.
These wizards lists the Lists the default and shared custom templates you can
use to create general, non-frames pages for your web.
(g) Highlight one according to your need, say Personal Web icon.
Specify a location for the web, on the right side of the dialog box. Click
OK.
(h) So, web sites created using Front Page templates and wizards
contain all sorts of unique Front Page features.

8. How to opening Web Page.


Ans. (a) You can open an existing web to edit or view it.
(b) Select File >Open Web.
(c) Under Web Folders, select the web you want to open and click
Open. The web opens

9. How to creating Hyperlinks.


Ans. You can create a hyperlink to a destination such as-
(a) A page or file in a web (from your home page to the other pages)
(b) A page or file on the World Wide Web (to a page or picture on
another Website)
(c) A page or file on a file system (to a file on a Network)
(d) A new page (from your home page to other pages in the web)
(e) An Office document (a document created in Word, Excel, or
PowerPoint)
(f) The Outlook Express (for sending feedback etc.)
10. How many types of lists are HTML?
Ans. There are three types of lists :-
(a) Ordered list
(b) Unordered list
(c) Definition and menu list

11. Write down the application of computer network.


Ans (a) Access to remote program
(b) Access to remote data
(c) Air/Hotel reservation
(d) Home banking
(e) Automated Newspaper
(f) Automated Library
(g) Electronic Mail

12. Write down classification of computer networks.


Ans: (a) LAN (local Area Network)
(b) MAN (Metropolitan Area Network)
(c) WAN (Wide Area Network)
13. Write down features or characteristics of LAN, WAN& MAN.
Ans LAN (a) Diameter of LAN not more than few km
(b) Complete ownership by a single organisations.

WAN (a) Covers entire country world


(b) Owned by multiple organizations

MAN (a) Man is a network that covers on entire city but uses a LAN
tech.

14. What is LAN and their features?


Ans.A LAN is a digital comn sys capable if interconnecting of large number of
computer terminals other peripheral devices within a limited geographical
area

Features of LAN
(a) A LAN sys that covers relatively short distance.
(b) A LAN usually is limited to a department or perhaps a single
building.
(c) A LAN must also reliable .
(d) A LAN essentially is a network designed for intelligent workstations
(PCs)
(g) User should be able to add OR Remove PC`s or peripherals to or
from the sys easily without causing extended interruption in a network
operation

15. How many types of LAN Topology.


Ans - There are five types of topology as under
(a) Bus Topology.
(b) Tree Topology
(c) Star topology
(d) Ring topology
(e) Mesh topology

16. What points to be born in your mind while sitting a LAN evaluation
the physical site?
Ans. (a) What is the max distance between workstations
(b) Can we use existing cable
(c) What are the types workstation that will be used
(d) What is the workstation distribution-clustered or distributed

17. What points to be will be born in your mind while sitting a network
function?
Ans (a) How many workstation
(b) How many hours each workstation will be in use
(c) List each workstations applications
(d) List the percentage of work day devoted to each application.

18. How many types of threats on a network.


Ans- (a) Passive threats
(b) Active threats

19. What are the level of security consider for the LAN.
Ans - (a) Physical Security
(b) Personal identification
(c) Password
(d) Security in log in
(e) Encryption
(f) Conversation encryption

20. Write down OSI Model layers?


Ans (a) Layers – application (b) Layers – presentation
(c) Layers - Session (d) Layers – Transport
(e) Layers – Network (f) Layers 2 – Data Link
(g) Layers 1 – Physical

21. What are the number of data Networks operating in India .


Ans : (a) IDNONET
(b) NICNET (National Information centre networks)
(c) ERNET (Education Research Net)
(c) VIKRAM
(d) RABMN
(e) Oilnet of ONGC, Railnet, NPTC Network, Hindustan petroleum net.

22. Write down the types of fiber optic.


Ans. There are two types of fiber optic
(a) Single Mode
(b) Multi Mode

23. Expend the following


(a) ISO - International Standard organization
(b) IEEE - Institute of Electrical and Electronic Engineers
(c) OSI - Open System Interconnection
(d) CSNET Computer science network
(e) BT Net Time Network
(f) UUCP - Unit to Unit copy program

24. Define Topology. .


Ans The comn network is case of Bus topology is a single cable called Bus of
transmission medium. No switches or repeater are used.

25. Define Network Interface Card (NIC).


Ans: Each workstation att to the Network reqd and interface comn. The interface
for comn is a cct board with the components necessary for sending and
receiving msg. This board is called the network Interface card for network
Adopter (IA)

26. What are the object of Information Security.


Ans. The object of Information Security is as under:
(a) Availability.
(b) Integrity of Data or Systems.
(c) Confidentiality of Data or Systems.
(d) Accountability.
(e) Assurance.

27. What is the need for LAN standardisation?


Ans. The LAN standardizations are as under:
(a) A LAN is based on important standard
(b) LAN was based on Hardware standard
(c) Ware standard operating sys provided a standard interface
between LAN Hard ware and LAN Application
(d) OSI Model is the basic frame work for LAN design
(e) LAN hardware sys like omninet, Ethernet, Arcnet were widely used

28. Define how to work the OSI .


Ans.
(a) OSI Model define the Net Work comn protocol or rule
(b) How a msg to be sent is prepared
(c) How comn channel is established
(d) How Comn are Managed
(e) OSI Model define network protocol is Layer
29. Write down the top to bottom level rules/Procedure in OSI Model.
Ans. (a) Rule of the top level how information application be sent over a net
work and used of application
(b) Rule of middle level, How connectional established and packet are
sent
(c) Rule of bottom level, consist of rules How Actual TXN process
through the cable

30. What point to be born in your mind while est a physical site of
Network?
Ans. While est a physical site of network must follows:
(a) What types of cable and Topology would prove best
(b) Net work topology should be Matched According to layout of site
(c) Proper selection of Topology is Must
(d) Start Topology is ideal in case of cultured workstation

31. Expand the Following:-


DRAM – Dynamic Random Access Memory
SRAM- Static Random Access Memory

32. What are the object of Information Security.


Ans. The object of Information Security is as under:
(a) Availability.
(b) Integrity of Data or Systems.
(c) Confidentiality of Data or Systems.
(d) Accountability.
(e) Assurance.

33. Define Bus Topology.


Ans. The comnNetwork ofbus topology is a single cable call bus OR TXN
medium. No switches or repeaters are used. All work station are connected
to single cable through hardware interfering

34. Define Tree Topology.


Ans. The tree topology is a generalisation of the bus topology. The
transmission medium is a branching cable with no closed loops. Cable
connection using tree topology starts at a point known as the Head. One or
more cables start at the head and each of them may branch out further

35 Define Star Topology.


Ans. Star topology connected like a star. Each work station connected point to
point link to common central switch. The central switch usually a server.Comn
between any two workstation is through central switch. In star topology
cables are not is fail only the work station attached to that cable break
down but not effect on network

36. Define Ring Topology.


Ans. In case of Ring Topology consists of a set of repeaters. There repeaters
are jointed by a point to point links in a closed loop. Each repeater connected
between two links. The links are capable of transmitting data in a one
direction only

37. What is WAN?


Ans. Computer installation, and use terminals may also enable LANs to
communicate with each other. It can developed to operate wordwide.
In WAN the TXN medium use are normally public sys as telephone lines
microwave and satellite link. Packet switching is most effective as public
connection served are available for packet switched WANs. A WAN si
also known as long haul network

38. Write down the advantage of layered architecture.


Ans. (a) Modification /up gradation of any layer without affecting other.
(b) Modularization Simplifies design.
(c) Different teams to design.
(d) Different machine may plug in at different levels.
(e) Relationship between different computers understood .
(f) Function may be built into hardware.

39. Write down the disadvantage of layered architecture.


Ans. (a) Higher over heads.
(b) Duplication of function at various levels.

40. What is computer Network.


Ans. A computer network is a data communication system that links multiple
computers and peripherals like printer, mass storage system, CD ROM
libraries, modem, Fax machines and many other devices, users exchange
electronic mail, work in group on projects, share licensed application and
access common resources.

41. Based on area coverage write down the classification of computer


networks.
Ans. Based on area coverage, it can be classified into three categories:-
(a) Local Area Network (LAN).
(b) Metropolitan Area Network (MAN).
(c) Wide Area Network (WAN).

42. What is LAN?


Ans. A Local Area Network is a digital communication system capable of
interconnecting a large number of computers, terminals and other
peripheral devices within a limited geographical Area, typically under one km
across like an office building or a campus and is owned by the using
organization in LAN, transmission channels generally use coaxial or fiber
optic cable and special interface units rather than telephone lines and
modems. Thus the x-mission speed is very high.

43. Write down the general characteristic features of LAN system.


Ans. (a) Diameter of not more than a few kms.
(b) Total data rate ranging from 1 MPBS to 20 MPBS.
(c) Complete ownership by a single organization.
(d) A LAN sys that covers relatively short distance.
(e) A LAN usually contains 03 to 12 PCs
(f) A LSN must also reliable.
(g) A LAN essentially is a network designed for intelligent workstations
(PCs)

44. List out the main hardware component of LAN system.


Ans. The basic LAN hardware components are:-
(a) Cable.
(b) Network interface card.
(c) Network server.
(d) Work stations.
(e) Shared resources peripherals.

45. Write down the x-mission media of WAN.


Ans. In a WAN the x-mission medium used are normally public system such
as:-
(a) Telephone lines.
(b) Micro wave.
(c) Satellite link.
(d) Packet Switching.

46. Write down the network structure of WAN.


Ans. User terminals are known as hosts. These terminals are connected to
communication network called subnet; the switching elements to which
hosts are connected are called IMP (Interface Message Processors). One
more element in subnet is transmission media.

47. Write down the advantage of layered architecture in WAN system.


Ans. (a) Modification/up gradation of any layer without effecting other.
(b) Modularization simplifies design.
(c) Different team to design.
(d) Different machine may plug in at different levels.
(e) Relationship between different computer understood, common low
level services may be shared by different users.
(f) Unction may be built into hardware.

48. Write short note on OSI reference model.


Ans. This model in based developed by ISO international standards
organization. The model is known as ISO reference model because it ideals
with connection open system.

49. What is gateway?


Ans. Gateways are used to interconnect networks, which are built on very
different communications architectures, for instance, a gateway may be
used to interconnect two networks, one of which uses the IP suite and the
other uses the SAN protocol suite. Since networks interconnected by a
gateway use dissimilar protocols, protocol conversion is the major job
performed by gateways. Additionally, gateways sometimes also perform
routing function. Gateways operate at the top three layers of the OSI
model (Session, Presentation & Application).

50. Write down the advantage of Bus topology.


Ans. Advantages of Bus topologies:-
(a) Failure of single computer doesn’t affect the entire LAN
(b) Easy to connect
(c) Inexpensive
51. What is Web page?
Ans. (a) Web Page is the basic unit of information in the WWW. Each
page contains Hyperlinks, which are pointers to additional Web Pages or
Internet resources accessible through the web.

(b) A web page is different from the other type of information on the
Internet because you can use a web page to link to other places on
the net. For example, clicking on a particular link or a hyperlink, will take
you to the connected Web Page. Now, this linking makes it a WEB.

(c) A unique thing about web pages is that they can display
different types of stuff such as-
(i) Text
(ii) Graphics

52. Define WWW.


Ans. The Internet is a global "Network of Networks". It is a massive collection of
Computersthat connects millions of Computers, People, Software
Programs, Databases and Files. This networks of networks is called the World
Wide Web

53. Write down disadvantages of Bus topology.


Ans. Disadvantages of Bus topology:-
(a) Cable break may affect large number of users
(b) Cable length is limited
(c) Difficult to isolate cable errors

54. Write down the facilities of Website.


Ans. (a) Whosoever discovers a need to communicate puts up a website
on Internet.
(b) Websites are easier to create and equally easier to update.
(c) Websites contain enormous information spread over several
levels, each with varying degrees of detail.
(d) Websites are easier to create and have the ability to refresh
information quickly , all at a small cost.
(e) Websites are a facilitator of market research. Website owners
can collect a number of statistics from their sites, which can be used by
them to fine tune their production and marketing activities.

55. What are the features of various Browsers?


Ans. Browser provide us with the following feature-
(a) Creating Signatures
(b) Attaching Files
(c) Attaching Files Through Outlook Express
(d) Attaching Files through Netscape Communicator

56. How to attach a file to an outgoing E-mail message?


Ans. (a) First click on Communicator Menu and select Messenger
Option.
(b) In the Inbox Dialog Box, click on File Menu and choose New
Message.
(c) In the Message Composition window, click and hold Attach
and then choose File.
(d) Select the file you want to attach and click Open.
(e) The file appears in the attachments list.

57. How to open a web page or a folder?


Ans. (a) To go to a Web page, type the Internet address in the Address
Bar, and then click the Go button.
(b) To browse through folders from the Address Bar, type the drive
and folder name, and then click the Go button.

58. How to add a page to your list of favorite pages.


Ans. (a) Go to the page you want to add to your Favorites list using
Internet Explorer.
(b) On the Favorites menu, click Add To Favorites.
(c) Type a new Name for the page.
(d) As your list of favoritepages grows, you can organize them into
folders.
(e) To open one of your favorite pages, click the Favorites menu,
and then click the page you want to open.

59. How to start Home page?


Ans. (a) When you start Netscape Communicator, you normally see
Navigator, your browser. The page that appears automatically is your
"home page".
(b) You may not always want the Netscape page to come up as
your first page. You may want someone else's site or a Search
engine if you want to do lot of searches all time.
(c) The home page is displayed when you click the Home button.
The home page is normally your starting page, first page displayed
when Navigator starts.

60. What are the art of security breach?


Ans. (a) Mind set
(b) Serendipity
(c) The Tempest re-written
(d) Mission Possible
(e) The beast and beauty
(f) Power is powerless
(g) Watch your traffic
(h) Where angles fear to Tread

61. What is security?


Ans. Security is not a product, nor is it a technology. Security is a process,
which consists of policy, procedure and training. It contains preventive control
measures and a healthy dose of awareness. It includes disaster recovery
and business continuity. The process of security is a state if mind that must
permeate an organization and its culture to be effective. Security in the e-age
has to be dynamic, constantly monitoring the health of a security system.

62. What are the security policy elements?


Ans. (a) Separation of Duty.
(b) Backup Controls.
(c) User Account Controls
(d) User Training.
63. What the networking industry has to say about securing a Network?
Ans. (a) Discovery
(b) Policy
(c) Enforce
(d) Test
(e) Authentication technologies
(f) Content security Technologies
(g) Antivirus software
(h) Intrusion Detection system

64. What you mean by IDS?


Ans. An intrusion detection system (IDS) monitors network traffic and monitors
for suspicious activity and alerts the system or network administrator. In some
cases the IDS may also respond to anomalous or malicious traffic by taking
action such as blocking the user or source IP address from accessing the
network.

65. Define NIDS.


Ans. Network Intrusion Detection Systems are placed at a strategic point or
points within the network to monitor traffic to and from all devices on the network.
Ideally you would scan all inbound and outbound traffic, however doing so
might create a bottleneck that would impair the overall speed of the network.

66 Define HIDS.
Ans. Host Intrusion Detection Systems are run on individual hosts or devices on
the network. A HIDS monitors the inbound and outbound packets from the
device only and will alert the user or administrator of suspicious activity is
detected.

67. Write down the types of Backup.


Ans. (a) Full Backup
(b) Partial Backup
(c) Incremental Backup

68. What are features of CMS(Content Management Sys)?


Ans. (a) Empower non-technical staff and facility to write, edit, and
manage Web content.
(b) Publish information to public-facing Web sites, format information
for alternate viewers such as cell phones and wireless devices.
(c) Dynamically update Web sites.
(d) Provide a centralized set of Web products that everyone can use.
(e) More easily safeguard data.
(f) Achieve a consistent look-and-feel.
69. What does Learning Management Sys (LMS) do?
Ans. (a) A web-based application through which learning content isdelivered
and managed.
(b) Provides education to public health workforce related to their roles
and needs.
(c) Promotes worker competencies.
(d) Associates competencies to worker roles.
(e) Assesses workers on competencies related to their assigned role
(f) Recommends appropriate courses based on assessments.
(g) Stores competency progress and course history for each learner.

70. What are Network features of SSL (Secure Socket Layer)?


Ans. (a) Privacy, where data messages are encrypted so that only the two
application endpoints understand the data.
(b) integrity, where message digests detect if any data was altered in
flight.
(c) Authentication, which verifies the identity of the remote node,
application, or user by using digital certificates.

71. Write down the feature of firewall.


Ans. (a) protects the user from unwanted incoming connection attempts.
(b) Alert the user about outgoing connection attempts.
(c) Allows the user to control which programs can and connot access
the local network and or internet.
(d) Monitor applications that are listening for incoming connections.
(e) Monitor and regulate all incoming and outgoing internet users.
(f) Prevent unwanted network traffic from locally installed applications.
(g) provide the user with information about an application that makes
a connection attempt
(h) provide information about the destination server with which an
application is attempting to communicate.

72. How to installing FTP Server 2008?


Ans. (a) On the taskbar, clickStart, point to Administrative Tools, and then
click Server Manager.

(b) In the Server Managerhierarchy pane, expand Roles, and then click
Web Server (IIS).

(c) In the Web Server (IIS) pane, scroll to the Role Services section,
and thenclick Add Role Services.

(d) On the Select Role Services page of the Add Role Services Wizard,
expand FTP Server.
(e) Select FTP Service. (Note: To support ASP.NET Membership or IIS
Manager authentication for the FTP service, you will also need to select
FTP Extensibility.)

(f) Click Next button.

(g) On the Confirm Installation Selections page, click Install button.

(h) On the Results page, click Close button.

73. Write down the type of E – mail Server 2008.


Ans. Typically servers are of four types:-
(a) FTP servers.
(b) Proxy servers.
(c) Online game servers.
(d) Web servers.

74. What are the action taken for Monitor dead?


Ans. (a) Monitor’s fuse blown.
(b) Monitor’s power supply section faulty.
(c) Fault in horizontal section.
[

75. What are the reasons for Print Quality is Poor of Dot Matrix Printer?
Ans. (a) Ribbon worn out or damaged.
(b) Print head too close to the platen.
(c) Ribbon Drive Assembly Faulty.
(d) Print head is Faulty.

76. What are the reasons for do not print (Power is ON But not Printing)?
Ans. (a) Printer cable not installed properly.
(b) Printer Cable is faulty.
(c) No paper or paper not installed properly.
(d) Printer Port Connection at PC is faulty.

77. What are Hardware components..


Ans. The Hardware components are follows:
(a) Network Interface Controller (NIC) card
(b) Cables
(c) HUB
(d) Switch
(e) Router
(f) Repeater
(g) Gateway
(h) Bridge
(i) Connectors
78. Write down the Types of HUBS and explain any one.
Ans. There are three types of HUBS, they are follows:
(a) Active Hubs. An active hub is usually powered and it amplifies
the signal to its original strength. Active hubs are the most common type
of hubs used in Networks. They are useful when the segments of the
networks are not close to one another and the signal may require
amplification.

(b) Passive Hubs. A passive hub is typically unpowered and makes


only physical electrical connections. It does not regenerate or amplify the
signal.

(c) Hybrid Hubs. Advanced hubs that will accommodate several


different types of cables are called hybrid hubs.

79. Write down the types of Software Components and explain any one.
Ans. (a) Protocols. Protocols are set rules that the computers on the
network must follow to communicate with each other.

(b) Device Drivers. A device driver is a program that controls the


functionality of the hardware device. For example, NIC driver controls the
functionality of the NIC, which acts as an interface through which a
computer connects to a network.

80. Write down the Difference between LAN AND MAN.

LAN MAN
Connects computer or Interconnect networks in a town or a city.
workstations in office or home.
Data Transmission Rate – Data Transmission Rate – Variable
10/100/1000 Mbps
Uses IEEE 802 standard Uses IEEE 802 standard

81. What are the Disadvantages of Server Based Network?


Ans. Server based networks have some disadvantages as follows:

(a) Expensive dedicated hardware.

(b) Expensive network operating system software and client licenses.

(c) A dedicated network administrator usually required.

82. What are the advantages of Peer to Peer Network?


Ans. The advantages of Peer to Peer Networks are as follows:
(a) Server is not required.
(b) Easy setup.
(c) No network administrator required.
(d) Users control resources sharing.
(e) Lower cost due to small network.
(f) Good performance for small network.

83. What are the disadvantages of Peer to Peer Networks?


Ans. The disadvantages of Peer to Peer Networks are as follows:
(a) Additional load on computers because of resource sharing.
(b) Inability of peers to handle as many network connections as server
based network.
(c) No central point of storage for file archiving, therefore data finding
is difficult.
(d) Weak security.
(f) Small Network.

84. What isProtocols and their characteristics?


Ans. A protocol is a set of rules that governs the format & meaningof frames,
packets or messages exchanged by peer entities within a layer. These
rules include guidelines that regulate the following characteristics of a network:-
(a) Access method.
(b) Allowed physical topologies.
(c) Types of cabling.
(d) Speed of data transfer.

85. What are the Common Networking Protocols?


Ans. The Common Networking Protocols are follows:
(a) TCP/IP.
(b) NetBEUI.
(c) IPX/SPX.
(d) NW Link.
(e) Apple Talk.
(f) DLC.

86. Define about Army Intranet.


Ans. Army Intranetis a secure Wide Area Network (WAN) that covers all
units/formations of Army starting from Army HQ to battalion/company
level. It is designed to share information and e-mailing for fast official
correspondence and reducing the paper work in Army offices. It is maintained
by Army HQ Computer Centre.
87. Write down the feature of Army Intranet.
Ans. The features of Army Intranet is as under:
(a) Secure Network.
(b) Electronic Mailing
(c) Information sharing
(d) E- learning
(e) Online direct test.
(f) Statement of Accounts by PAO (OR).
(g) Personal information
(h) Signal Record Complaint cell.

88. What are the object of Information Security.


Ans. The object of Information Security is as under:
(a) Availability.
(b) Integrity of Data or Systems.
(c) Confidentiality of Data or Systems.
(d) Accountability.
(e) Assurance.

89. What are the of performance of Malicious Software?


Ans. There are essentially six types of behaviour seen in traditional malware :
(a) Installation. Getting into a system and modifying that system so
that the code runs frequently or every time on start up.
(b) Surveying. Finding new targets (seen only in viruses)
(c) Replication. Getting into those new targets(seen only in viruses)
(d) Concealment. Hiding the presence of or preventing the
removal of the software.
(e) Injection. Getting inside the code or data of the other innocuous
processes on the system to gain additional privileges, achieve
concealment, or deliver payload.
(f) Payload. Doing something to the host computer,
communicating data to third parties, or receiving command from third
party.

90. Write down the Type of Computer viruses.


Ans. The types of Computer viruses are as under:
(a) Boot Sector Infectors (BSI)
(b) Command Processor Infectors (CPI)
(c) General Purpose Infectors (GPI)
(d) Multipurpose Infectors (MPI)
(e) File specific Infectors (FSI)
(f) Memory Resident Infectors (MRI).

91. Write down the Types of Cyber Security Auditsexplain any one.
Ans. (a) Internal Audit.
(b) External Audit.
(c) Third Party Audit.

Internal Audit. Evaluating the Cyber Security posture of own


establishment is termed as Internal Audit.

External Audit. External Audit is conducted by one-up formation to


verify host as well as perimeter defence of the respective networks.

Third Party Audit. Ordered in special cases, wherein, cyber security


cells of two-up formation will conduct audit of the fmn in question. Third
party audit cannot be under any circumstances be out-sourced to any
civilian/commercial agency.

92. How many types of main IDS explain any one?


Ans. There are two main types of IDS:-
(a) Network Intrusion Detection System (NIDS)
(b) Host-Based Intrusion Detection System (HIDS)

Network Intrusion Detection System (NDIS) - NDIS an independent platform


that identifies intrusions by examining network traffic and monitors multiple hosts.
Network intrusion detection systems gain access to network traffic by connecting
to a network hub, network switch configured for port mirroring, or network tap. In
a NIDS, sensors are located at choke points in the network to be monitored,
often in the demilitarized zone (DMZ) or at network borders. Sensors capture all
network traffic and analyze the content of individual packets for malicious traffic.
An example of a NIDS is Snort.

Host-Based Intrusion Detection System(HIDS) - It consists of an agent on a


host that identifies intrusions by analyzing system calls, application logs, file-
system modifications and other host activities and state. In a HIDS, sensors
usually consist of a software agent. Some application-based IDS are also part of
this category.

93. What is a Learning Management System?


Ans. A Learning Management System (LMS) is a web-based application
through which learning content is delivered and managed. An LMS is tied to
on-line and off-line training, administration, and performance management and
includes functionality for course catalogs, launching courses, registering
learners, tracking learner progress and assessments. An LMS combines a
front-end for the learner with a back-end for administrators and instructors.
94. Write down the technical aspects of LMS.
Ans. Most LMSs are web-based, built using a variety of development platforms,
like Java/J2EE, Microsoft .NET or PHP. They usually employ the use of a
database like MySQL, Microsoft SQL Server or Oracle as back-end. Although
most of the systems are commercially developed and have commercial
software licenses there are several systems that have an open-source license.

95. Write down the advantage of star topology.


Ans. Advantages of star topology are as follows:-
(a) Troubleshooting and fault isolation is easy.
(b) It is easy to add or remove nodes and to modify the cable layout.
(c) Failure in any star network cable will only affect the connected
computer and not the entire network.

96. Write down the disadvantage of star topology.


Ans. Disadvantage of this topology are:-
(a) If the hub fails, the entire network fails.
(b) It requires more cable than bus topology.

97. Write down the TCP/IP Application.


Ans. The TCP/IP Applications are as under:
(a) Application layer.
(i) File Transfer Protocol (FTP).
(ii) Remote Login (Telnet).
(iii) E-mail (SMTP).

(b) Transport layer.


(i) Transport Control Protocol (TCP)
(ii) User Datagram Protocol (UDP)

(c) Network layer.


(i) Internet Protocol (IP)

(d) Data link Layer.


(i) Ethernet, Token Ring, FDDI, etc.
(ii) Frame Relay, X.25, etc.

You might also like