Current Affairs PDF

Computer Networking Questions – Set 12

AffairsCloud YouTube Channel - Click Here

AffairsCloud APP Click Here

Dear Aspirants,

Welcome to the Professional Knowledge Section in Affairscloud.com. Here we are providing sample questions in Computer Networking. It will be useful for the upcoming SBI Assistant Manager(System) and RRB Officer Scale – II(IT Officer) examinations. We have also included some important questions that are repeatedly asked in previous exams.

  1. Which of the following is a client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address?
    A. Session Initiation Protocol
    B. Trivial File Transfer Protocol
    C. Secure Hypertext Transfer Protocol
    D. Dynamic Host Configuration Protocol
    E. None of the Above
    D. Dynamic Host Configuration Protocol
    Explanation:
    Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the sub net mask and default gateway.

  2. ______ is a computer networking protocol that provides for automatic assignment of available Internet Protocol (IP) routers to participating hosts.
    A. Session Initiation Protocol
    B. Virtual Router Redundancy Protocol
    C. Secure Hypertext Transfer Protocol
    D. Dynamic Host Configuration Protocol
    E. None of the Above
    B. Virtual Router Redundancy Protocol
    Explanation:
    Virtual Router Redundancy Protocol (VRRP) provides for automatic assignment of available Internet Protocol (IP) routers to participating hosts. This increases the availability and reliability of routing paths via automatic default gateway selections on an IP sub network.

  3. Which of the following is a signaling protocol used to create, manage and terminate sessions in an IP based network?
    A. Session Initiation Protocol
    B. Trivial File Transfer Protocol
    C. Secure Hypertext Transfer Protocol
    D. Dynamic Host Configuration Protocol
    E. None of the Above
    A. Session Initiation Protocol
    Explanation:
    The Session Initiation Protocol (SIP) is an Internet Engineering Task Force (IETF) standard protocol for initiating an interactive user session that involves multimedia objects such as video, chat and gaming.

  4. Which of the following is used to support virtual private networks (VPNs)?
    A. SIP
    B. TFTP
    C. L2TP
    D. DHCP
    E. None of the Above
    C. L2TP
    Explanation:
    In computer networking, Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs). It does not provide any encryption or confidentiality by itself.

  5. _______ provides a mechanism used to connect to, search, and modify Internet directories.
    A. SIP
    B. TFTP
    C. L2TP
    D. DHCP
    E. LDAP
    E. LDAP
    Explanation:
    Lightweight Directory Access Protocol (LDAP) is a directory service protocol that runs on a layer above the TCP/IP stack. It provides a mechanism used to connect to, search, and modify Internet directories. The LDAP directory service is based on a client-server model.

  6. Which is designed to exchange routing and reach ability information among autonomous systems (AS) on the Internet?
    A. Session Initiation Protocol
    B. Border Gateway Protocol
    C. Server Message Block Protocol
    D. Dynamic Host Configuration Protocol
    E. None of the Above
    B. Border Gateway Protocol
    Explanation:
    Border Gateway Protocol(BGP) directs packets between autonomous systems (AS) i.e.,networks managed by a single enterprise or service provider.

  7. __________ allows applications on a computer to read and write to files and to request services from server programs in a computer network
    A. Server Message Block (SMB) protocol
    B. Border Gateway Protocol
    C. Secure Hypertext Transfer Protocol
    D. Dynamic Host Configuration Protocol
    E. None of the Above
    A. Server Message Block (SMB) protocol
    Explanation:
    The Server Message Block (SMB) protocol is a network file sharing protocol that allows applications on a computer to read and write to files and to request services from server programs in a computer network. The SMB protocol can be used on top of its TCP/IP protocol or other network protocols. Using the SMB protocol, an application (or the user of an application) can access files or other resources at a remote server.

  8. ________ forms part of the Point-to-Point Protocol (PPP), within the family of Internet protocols.
    A. SIP
    B. TFTP
    C. L2TP
    D. DHCP
    E. LCP
    E. LCP
    Explanation:
    Link Control Protocol (LCP) operates at the data-link layer (layer 2) of the Open Systems Interconnection (OSI) reference model.

  9. Which of the following is an encapsulation of the Internet Protocol designed to work over serial ports and modem connections?
    A. SLIP
    B. TFTP
    C. L2TP
    D. DHCP
    E. LCP
    A. SLIP
    Explanation:
    Serial Line Internet Protocol(SLIP) is a TCP/IP protocol used for communication between two machines that are previously configured for communication with each other.

  10. A specification that provides an inter operable framework for e-commerce is known as ___________
    A. SLIP
    B. IOTP
    C. L2TP
    D. DHCP
    E. LCP
    B. IOTP
    Explanation:
    The Internet Open Trading Protocol(IOTP) is a protocol provides an interoperable, standardized and payment system independent framework for e-commerce.