Computer Architecture And Organization Set 2
On This Page
This set of Computer Architecture and Organization Multiple Choice Questions & Answers (MCQs) focuses on Computer Architecture And Organization Set 2
Q1 | Which one of the following is not an application layer protocol used in internet?
- remote procedure call
- internet relay chat
- resource reservation protocol
- local procedure call
Q2 | Which protocol assigns IP address to the client connected in the internet?
- dhcp
- ip
- rpc
- rsvp
Q3 | Which one of the following is not used in media access control?
- ethernet
- digital subscriber line
- fiber distributed data interface
- packet switching
Q4 | Which level is the network layer in the OSI model?
- third level
- fourth level
- second level
- fifth layer
Q5 | Data in network layer is transferred in the form of
- layers
- packets
- bytes
- bits
Q6 | The network layer contains which hardware device?
- routers, bridges
- bridges only
- bridges and switches
- routers, bridges and switches
Q7 | Network layer protocol exits in
- host
- switches
- packets
- bridges
Q8 | What are the common protocols associated with the network layer?
- address resolution protocol
- reverse address resolution protocol
- internet protocol
- neighbour discovery protocol
Q9 | The network layer responds to request from which layer?
- transport layer
- data layer
- application layer
- session layer
Q10 | The network layer issues request to which layer?
- transport layer
- data layer
- application layer
- session layer
Q11 | IP is connectionless.
- true
- false
Q12 | Does network layer in TCP/IP and OSI Model are same.
- true
- false
Q13 | What are called routers?
- the devices that operates at session layer
- the devices that operates at data layer
- the devices that operates at application layer
- the devices that operates at network
Q14 | ICMP stands for
- internet coordinate message protocol
- internet control message protocol
- interconnect control message protocol
- interconnect coordinate message protocol
Q15 | Packets will be transferred in how many types?
- 5 types
- 4 types
- 2 types
- 3 types
Q16 | DDP stands for
- datagram delivery protocol
- device delivery protocol
- datagram device protocol
- device datagram protocol
Q17 | RIP stands for
- reduced information protocol
- routing internet protocol
- routing information protocol
- reduced internet protocol
Q18 | The model is 7-layer architecture where each layer is having some specific functionality to perform.
- tcp/ip
- cloud
- osi
- ois
Q19 | The full form of OSI is OSI model is
- open systems interconnection
- open software interconnection
- open systems internet
- open software internet
Q20 | Which of the following is not physical layer vulnerability?
- physical theft of data & hardware
- physical damage or destruction of data & hardware
- unauthorized network access
- keystroke & other input logging
Q21 | In layer, vulnerabilities are directly associated with physical access to networks and hardware.
- physical
- data-link
- network
- application
Q22 | Loss of power and unauthorized change in the functional unit of hardware comes under problems and issues of the physical layer.
- true
- false
Q23 | Which of the following is not a vulnerability of the data-link layer?
- mac address spoofing
- vlan circumvention
- switches may be forced for flooding traffic to all vlan ports
- overloading of transport-layer mechanisms
Q24 | is data-link layer vulnerability where stations are forced to make direct communication with another station by evading logical controls.
- vlan attack
- vlan circumvention
- vlan compromisation method
- data-link evading
Q25 | may be forced for flooding traffic to all VLAN ports allowing interception of data through any device that is connected to a VLAN.
- switches
- routers
- hubs
- repeaters