3
Which of the following terms is used to describe a hardware- or software-based
device that protects networks from outside threats?
✓Solution
A **Firewall** is a network security system that monitors and controls incoming
and outgoing network traffic based on predetermined security rules.
1
Bitcoin uses which network technology for transaction and mining?
✓Solution
Bitcoin operates on decentralized peer-to-peer (P2P) network technology.
2
Which of the following is a popular VoIP application?
✓Solution
Skype is a well-known VoIP app.
3
Which of the following is a Class-A IP address?
✓Solution
Class-A addresses range from 1.0.0.0 to 126.255.255.255.
Hence 125.10.10.1 belongs to Class A.
3
The default subnet mask for Class-A IP address is …
✓Solution
A has first octet for network and three octets for host, so mask = 255.0.0.0.
4
Which of the following IP address classes is reserved for multicasting?
✓Solution
Class D addresses (224.0.0.0 to 239.255.255.255) are used for multicasting.
3
The number of links in a fully meshed network of N nodes is …
✓Solution
Each node is connected to every other node once.
Total links = $\dfrac{N(N-1)}{2}$.
2
What is the term used for verification of a login name and password in computer terminology?
✓Solution
The process of verifying a user's login credentials (username and password) is called Authentication.
2
In networking terminology, UTP means —
2
3
4
✓Solution
UTP (Unshielded Twisted Pair) is a type of cable commonly used in computer networking and telecommunication.
3
What is a Firewall in Computer Network?
1
2
3
4
✓Solution
A Firewall is a security system that monitors and controls incoming and outgoing network traffic based on predefined rules.