Shivaji University, Kolhapur
Question Bank for Mar 2022 (summer) Examination
Subject Code :_____ 81986 _________Subject Name : ___ Computer Network
_____________________
Common subject Code (if any) ______________________________________
--------------------------------------------------------------------------------------------
1] In_______ data communication method is used to transmit the data over a serial
communication link
a] Simplex
b] Half-duplex
c] Full duplex
d] All of above
2] The OSI model has ________ layers.
a] 5
b] 6
c] 7
d] 8
3] Which of the following transmission directions listed is not a legitimate channel?
a] Simplex
b] Half duplex
c] Full duplex
d] Double duplex
4] Which type of topology is best suited for large businesses which must carefully control and
coordinate the operation of distributed branch outlets?
a] Ring
b] Local area
c] Hierarchical
d] star
5] The topology with highest reliability is __________
a] Bus topology
b] Star topology
c] Ring Topology
d] Mesh Topology
6] ___________ layer is concerned with syntax and semantics of the information transmitted in
OSI/ISO model.
a] Presentation
b] Application
c] Session
d] Data link
7] What kind of transmission medium is most appropriate to carry data in a computer network
that is exposed to electrical interferences?
a] unshielded twisted pair
b] Optical fiber
c] Coaxial cable
d] microwave
8] _________ are advantages of wireless LAN
a] Convenience
b] Mobility
c] Both Convenience and Mobility
d] None of These
9] Which of the following cannot be used as a medium for 802.3 Ethernet?
a] Thin coaxial cable
b]twisted pair
c] Microwave link
d] fiber optical cable
10] ----is also a static algorithm in which every incoming packet is sent out on every outgoing
line except the one it arrives on.
a] Shortest Path Algorithm
b] Flooding
c] Distance Vector Routing
d] Hierarchical Routing
l1] In _______ data is hidden behind picture.
a] Substitution
b] Stenography
c] Transposition
d] one time pad
12] __________ allows addressing of packets to all destinations
a] Multitasking
b] Broadcasting
c] Hierarchical
d] Unitasking
13] __________ factors cause congestion.
a] Insufficient memory
b] Busty Traffic
c] Slow processor
d] All of these
14] To join the internet, the computer has to be connected to a
a] internet architecture board
b]) internet society
c] internet service provider
d] none of the mentioned
15] Internet works on
a] packet switching
b] circuit switching
c] both packet switching and circuit switching
d]none of the mentioned
16] In this topology there is a central controller or hub
a] Star
b] Mesh
c] Ring
d] Bus
17] What is a web browser?
a] a program that can display a web page
b] a program used to view html documents
c] it enables user to access the resources of internet
d] all of the mentioned
18] For a connection oriented service, we need a _________
a] Virtual circuit subnet
b] Short circuit subnet
c] Datagram subnet
d] Wireless subnet
19] Repeater functions in the ________ layer.
a] Physical
b] data link layer
c] Network
d] None
20] In _________, each packet of a message need not follow the same path from sender to
receiver.
a] Circuit switching
b] Message switching
c] Virtual approach to packet switching
d] Datagram approach to packet switching
21] Which of the following routing algorithm takes into account the current network load?
a] Broadcast
b] Shortest path
c] Flooding
d] Distance vector routing
22] Upon receipt of a bad segment, UDP _________
a] it does flow control
b] It does error control
c] Retransmission
d] It does not do flow and error control
23] Flow control policy is implemented in __________
a] Network layer
b] Transport layer
c] Application layer
d] Physical layer
24] the design issue of Data link Layer in OSI Reference Model is
a] Framing
b] Representation of bits
c] Synchronization of bits
d] Connection control
25] Sending of a IP packet from host 1 to host 2 where both are of same LAN but the packet is
transferred through different intermediate called _________
a] Tunneling
b] Routing
c] Diverting
d] Forwarding
26] In shortest path routing algorithm, the path length is measured based on _________
a] Time delay
b] Number of hops
c] Size of the routers
d] Routing table
27] In which routing method do all the routers have a common database?
a] Distance Vector
b] Link Vector
c] Shortest path
d] Link State
28] The regions in Hierarchical routing are grouped in to ________
a] Clusters
b] Zones
c] Blocks
d] Cells
29] Packet discard policy is implemented in _________
a] Physical layer
b] Data link layer
c] MAC layer
d] Network layer
30] The solution to increase the capacity when congestion occurs is __________
a] Denying service to the users
b] Degrading the service to the users
c] Splitting traffic over multiple routes
d] Rescheduled the demands of the users
31] FDDI stands for
a] Fiber Distributed Data Interface
b] Fiber Data Distributed Interface
c] Fiber Dual Distributed Interface
d] Fiber Distributed Data Interface
32] Which of the following is an application layer service?
a] Network virtual terminal
b]File transfer, access and management
c] Mail service
d] All of the above
33] TCP/IP.................. layer corresponds to the OSI models to three layers.
a] Application
b] Presentation
c] Session
d] Transport
34] Which of the transport layer protocols is connectionless?
a] UDP
b] TCP
c] FTP
d] Nvt
35] Which algorithm provides the private key and its corresponding public key?
a]Key generation algorithm
b] Signature verifying algorithm
c] Signing algorithm
d] None of the above
36]A firewall need to be--------so that it can be grow proportionally with the network that it
protects.
a] Robust
b] Expensive
c] Fast
d] Scalable
37] A packet filter firewall filter at--------------------
a]Physical layer
b] data link layer
c]Network layer or transport layer
d]application layer
38] The data unit in the TCP/IP layer called a.....
a] Message
b] Segment
c] Datagram
d] Frame
39] Public key cryptography is a ... cryptosystem
a] Symmetric
b] Asymmetric
c] Symmetric and asymmetric
d] none
40] A mechanism used to encrypt and decrypt data.
a] Cryptography
b] Algorithm
c] Data flow
d] None of these
Descriptive Questions
1. What is network? Explain different applications of networking.
2. Explain different network topologies with suitable diagrams.
3. What is OSI reference model? Explain different layers of OSI model.
4. Explain TCP/IP protocol suite.
5. Differentiate between OSI reference model and TCP/IP model.
6. Write a short note on telephone network.
7. What is Asynchronous and synchronous transmission? Explain in detail with suitable
diagram.
8. Differentiate between Asynchronous and synchronous transmission.
9. Write a note on guided transmission media.
10. Write a note on un- guided transmission media.
11. What are the service primitives?
12. Differentiate between Connection-oriented and connectionless Services.
13. Differentiate between TCP and UDP.
14. Write a note on Layered network architecture.
15. Explain LAN, MAN and WAN.
16. What is switching? Explain the types of switching techniques.
17. Differentiate between message switching and packet switching.
18. What is router? Explain packet routing in the network
19. What is optimality principle? Explain with neat diagram.
20. Explain the optimality principle.
21. Explain shortest path routing with example.
22. Write a note on flooding.
23. Elaborate distance vector routing algorithm.
24. Elaborate link-state routing algorithm.
25. Elaborate hierarchical routing algorithm.
26. Elaborate broadcast routing.
27. What is Congestion control? Explain its prevention policies.
28. Write a note on hierarchical routing and broadcast routing.
29. Write a note in Distance Vector Routing and Link State Routing.
30. Write a note on Network Protocols.
31. Explain different goals of Layered Protocols.
32. Discuss Network Design problems.
33. Explain services of all layers in OSI model.
34. Explain Token Ring with neat diagram.
35. Explain Token Bus with neat diagram.
36. Elaborate Token passing (priority systems).
37. Write a note on FDDI.
38. Write a note on TCP/IP protocols.
39. Explain IP address and major features of IP.
40. Write a note on TCB (transmission control blocks).
41. Write a note on IP datagram.
42. What is the need of network security?
43. Explain Bit rate, bit length, base band transmission.
44. What is Cryptography? Explain types of cryptography.
45. Explain symmetric and asymmetric cryptography.
46. Explain public key signature.
47. Explain message digest.
48. Write a note on web security.
49. Write a note on wireless security.
50. Write a note on email security.
51. What is Authentication? Explain in detail any two authentication protocols.
52. What is firewall? Explain types of firewall.
53. Write a note on virtual private networks (VPN).
54. Explain digital signature.
55. What are the applications of cryptography?
56. Explain SSL in detail.
57. Explain radio waves, microwaves, infrared rays.
58. Differentiate between symmetric and asymmetric cryptography.
59. Explain Asymmetric key in detail.
60. Explain Symmetric key in detail.