Top 250+ Solved Computer Architecture and Organization MCQ Questions Answer

From 106 to 120 of 268

Q. Which one of the following is not used in media access control?

a. ethernet

b. digital subscriber line

c. fiber distributed data interface

d. packet switching

  • d. packet switching

Q. Which level is the network layer in the OSI model?

a. third level

b. fourth level

c. second level

d. fifth layer

  • a. third level

Q. The network layer contains which hardware device?

a. routers, bridges

b. bridges only

c. bridges and switches

d. routers, bridges and switches

  • d. routers, bridges and switches

Q. Network layer protocol exits in                    

a. host

b. switches

c. packets

d. bridges

  • a. host

Q. What are the common protocols associated with the network layer?

a. address resolution protocol

b. reverse address resolution protocol

c. internet protocol

d. neighbour discovery protocol

  • c. internet protocol

Q. The network layer responds to request from which layer?

a. transport layer

b. data layer

c. application layer

d. session layer

  • a. transport layer

Q. The network layer issues request to which layer?

a. transport layer

b. data layer

c. application layer

d. session layer

  • b. data layer

Q. Which of the following is not a vulnerability of the network layer?

a. route spoofing

b. identity & resource id vulnerability

c. ip address spoofing

d. weak or non-existent authentication

  • d. weak or non-existent authentication

Q. Which of the following is an example of physical layer vulnerability?

a. mac address spoofing

b. physical theft of data

c. route spoofing

d. weak or non-existent authentication

  • b. physical theft of data

Q. Which of the following is an example of data-link layer vulnerability?

a. mac address spoofing

b. physical theft of data

c. route spoofing

d. weak or non-existent authentication

  • a. mac address spoofing

Q. Which of the following is an example of network layer vulnerability?

a. mac address spoofing

b. physical theft of data

c. route spoofing

d. weak or non-existent authentication

  • c. route spoofing

Q. Which of the following is an example of physical layer vulnerability?

a. mac address spoofing

b. route spoofing

c. weak or non-existent authentication

d. keystroke & other input logging

  • d. keystroke & other input logging

Q. Which of the following is an example of data-link layer vulnerability?

a. physical theft of data

b. vlan circumvention

c. route spoofing

d. weak or non-existent authentication

  • b. vlan circumvention

Q. Which transmission media provides the highest transmission speed in a network?

a. coaxial cable

b. twisted pair cable

c. optical fiber

d. electrical cable

  • c. optical fiber
Subscribe Now

Get All Updates & News