1. Which one of the following is NOT true for a computer virus?
a) computer virus can be contracted via internet
b) computer virus is a software
c) another standalone computer in the vicinity of the virus affected computer may be contracted with virus
d) pen drives can contract with virus
Ans: C
2. How many hosts can successfully send data simultaneously on Ethernet?
a) 1 b) 2
c)3 d) unlimited
Ans: B
3. Which one of the following uses the greatest number of layers in the OSI model?
(a) Bridge (b) Repeater
(c) Router (d) Gateway
Ans: D
4. Which of the fol lowing 802 standard provides for a collision free protocol?
(a) 802.2 (b) 802.3
(c) 802.5 (d) 802.6
Ans: C
5. In asymmetric key cryptography, _______ keys are required per communicating party
a) 2 b)3
c)4 d) 5
Ans: A
6. What is the default port number for FTP?
a) 21 b) 18
c) 25 d)20
Ans: A
7. A digital signature is
a) a bit string giving identity of a correspondent
b) a unique identification of a sender
c) an authentication of an electronic record by tying it uniquely to a key only a sender can posses
d)an encrypted signature of sender
Ans:C
8. A basic telephone system is an example of
a) packet switching b) cell switching
c) circuit switching d) message switching
Ans: C
9. The access method used in Ethernet LAN is
a) CSMA/CA b) CSMA/CD
c) CLIP d) CMA/CD
Ans: B
10. Which one of the following is used to communicate between different networks
a) ADSL b) HDSL
c) Gateway d) Modem
Ans: C