Computer Architecture And Organization Set 2

On This Page

This set of Computer Architecture and Organization Multiple Choice Questions & Answers (MCQs) focuses on Computer Architecture And Organization Set 2

Q1 | Which one of the following is not an application layer protocol used in internet?
  • remote procedure call
  • internet relay chat
  • resource reservation protocol
  • local procedure call
Q2 | Which protocol assigns IP address to the client connected in the internet?
  • dhcp
  • ip
  • rpc
  • rsvp
Q3 | Which one of the following is not used in media access control?
  • ethernet
  • digital subscriber line
  • fiber distributed data interface
  • packet switching
Q4 | Which level is the network layer in the OSI model?
  • third level
  • fourth level
  • second level
  • fifth layer
Q5 | Data in network layer is transferred in the form of                          
  • layers
  • packets
  • bytes
  • bits
Q6 | The network layer contains which hardware device?
  • routers, bridges
  • bridges only
  • bridges and switches
  • routers, bridges and switches
Q7 | Network layer protocol exits in                    
  • host
  • switches
  • packets
  • bridges
Q8 | What are the common protocols associated with the network layer?
  • address resolution protocol
  • reverse address resolution protocol
  • internet protocol
  • neighbour discovery protocol
Q9 | The network layer responds to request from which layer?
  • transport layer
  • data layer
  • application layer
  • session layer
Q10 | The network layer issues request to which layer?
  • transport layer
  • data layer
  • application layer
  • session layer
Q11 | IP is connectionless.
  • true
  • false
Q12 | Does network layer in TCP/IP and OSI Model are same.
  • true
  • false
Q13 | What are called routers?
  • the devices that operates at session layer
  • the devices that operates at data layer
  • the devices that operates at application layer
  • the devices that operates at network
Q14 | ICMP stands for                      
  • internet coordinate message protocol
  • internet control message protocol
  • interconnect control message protocol
  • interconnect coordinate message protocol
Q15 | Packets will be transferred in how many types?
  • 5 types
  • 4 types
  • 2 types
  • 3 types
Q16 | DDP stands for                    
  • datagram delivery protocol
  • device delivery protocol
  • datagram device protocol
  • device datagram protocol
Q17 | RIP stands for                  
  • reduced information protocol
  • routing internet protocol
  • routing information protocol
  • reduced internet protocol
Q18 | The                          model is 7-layer architecture where each layer is having some specific functionality to perform.
  • tcp/ip
  • cloud
  • osi
  • ois
Q19 | The full form of OSI is OSI model is
  • open systems interconnection
  • open software interconnection
  • open systems internet
  • open software internet
Q20 | Which of the following is not physical layer vulnerability?
  • physical theft of data & hardware
  • physical damage or destruction of data & hardware
  • unauthorized network access
  • keystroke & other input logging
Q21 | In                                      layer, vulnerabilities are directly associated with physical access to networks and hardware.
  • physical
  • data-link
  • network
  • application
Q22 | Loss of power and unauthorized change in the functional unit of hardware comes under problems and issues of the physical layer.
  • true
  • false
Q23 | Which of the following is not a vulnerability of the data-link layer?
  • mac address spoofing
  • vlan circumvention
  • switches may be forced for flooding traffic to all vlan ports
  • overloading of transport-layer mechanisms
Q24 |                          is data-link layer vulnerability where stations are forced to make direct communication with another station by evading logical controls.
  • vlan attack
  • vlan circumvention
  • vlan compromisation method
  • data-link evading
Q25 |                                 may be forced for flooding traffic to all VLAN ports allowing interception of data through any device that is connected to a VLAN.
  • switches
  • routers
  • hubs
  • repeaters