Computer Networking Multiple Choice Questions (Part 2)

Test your computer networking knowledge with this set of multiple-choice questions. Check your answers against the detailed explanations provided below to solidify your understanding of key networking concepts.



Computer Networking Multiple Choice Questions (Part 2)

Instructions

Choose the best answer for each question. Explanations are provided below.

Question 1: In which of the following switching methods is the message divided into small packets?

  1. Message switching
  2. Packet switching
  3. Virtual switching
  4. None of these

Question 2: Which of the following switch methods creates a point-to-point physical connection between two or more computers?

  1. Message switching
  2. Packet switching
  3. Circuit switching
  4. None of these

Question 3: What is the second name of the proxy server?

  1. Proxy tools
  2. Application proxy
  3. Application-level gateway
  4. All of these

Question 4: Which of the following servers allows LAN users to share data?

  1. Data server
  2. Point server
  3. File server
  4. Communication server

Question 5: What is the total vulnerable time value of pure Aloha?

  1. Tfr
  2. 1/2 Tfr
  3. 2 * Tfr
  4. 4 * Tfr

Question 6: How many fields are in the SMDS packet?

  1. Two
  2. Three
  3. Four
  4. Five

Question 7: What is the maximum data transfer rate of optical fiber wire?

  1. 50 kbps
  2. 1000 kbps
  3. 1000 Mbps
  4. None of these

Question 8: POTS network works on the principle of ________

  1. Telephone switching
  2. Proxy server
  3. File system
  4. Circuit switching

Question 9: Which of the following protocols is a bit-oriented protocol?

  1. SSL
  2. HTTP
  3. HDLC
  4. All of these

Question 10: SLIP stands for _______

  1. System line internet protocol
  2. Serial line internet protocol
  3. Signal line internet protocol
  4. Signal internet protocol

Question 11: The second port is used to ____________ in a two-port network.

  1. Input terminal
  2. Output terminal
  3. Signal terminal
  4. Bandwidth terminal

Question 12: Which of the following layers does the HTTP protocol work on?

  1. Physical layer
  2. Data-link layer
  3. Application layer
  4. None of these

Question 13: Which of the following statements is correct about a cipher in cryptography?

  1. It is a method for performing encryption and decryption.
  2. It is used to establish a network connection.
  3. It is a message event.
  4. All of these.

Question 14: SONET stands for ______________.

  1. Signal Operation Network
  2. Synchronous Optical Network
  3. System Optical Network
  4. Signal Optical Network

Question 15: How many layers does SONET contain?

  1. 2 layers
  2. 3 layers
  3. 4 layers
  4. 5 layers

Question 16: A RAKE receiver is designed for _____.

  1. Multipath fading
  2. Signals
  3. Data network
  4. Network connection