Computer Network Management Questions and Answers – Network Node Components

This set of Computer Network Management Multiple Choice Questions & Answers (MCQs) focuses on “Network Node Components”.

1. ___________ is one of the resource for network node.
a) Hub
b) Ethernet
c) Modem
d) Radio
View Answer

Answer: a
Explanation: Resources used for network nodes are hubs, switches, bridges, routers and gateways or a combination of the above such as a brouter and hub.

2. ____________ is considered as a network node and also network security.
a) Malware
b) Firewall
c) Ransomware
d) Mobile secure gateway
View Answer

Answer: b
Explanation: Firewall is an entity that is a network security component but it is also considered as a network node. Malware and Ransomware are generally cyber security threats and do not qualify under network security components. Mobile secure gateway on the other is a defense method against cyber threats and is not a network node.

3. At the Data Link layer, Bridge acts as an intelligent __________ switch.
a) Packet
b) Circuit
c) Segment
d) Frame
View Answer

Answer: a
Explanation: When a group of data is transmitted from a source to its destination in the form of packets then that process is termed as packet switching. Bridges are one such network node which uses packet switching as their transmission method. They are used for connecting LANs.
advertisement
advertisement

4. Router works at the transport layer of OSI Model.
a) True
b) False
View Answer

Answer: b
Explanation: This given statement is false. Router is a network node component that operates on Network Layer. It helps in sending the data packets to the destination network. It provides appropriate direction to the data packets in network.

5. The routing algorithm used by transparent bridge is __________ algorithm.
a) Distance Vector Routing
b) Backward learning
c) Spanning-tree
d) Link State Routing
View Answer

Answer: c
Explanation: Transparent bridges maintain a routing table. This table comprises of MAC (Media Access Control) addresses. It connects two LANs. It acts transparent to other networks thus the name Transparent bridge is justified. It maintains the information regarding traffic in a particular network. Transparent Bridges are used generally in Ethernet. Thus Spanning-tree algorithm is used in transparent bridge.
Sanfoundry Certification Contest of the Month is Live. 100+ Subjects. Participate Now!

6. In a LAN configuration, hubs can be seen as a DTE (Data Terminal Equipment) that are connected using _______
a) switches
b) routers
c) modem
d) repeaters
View Answer

Answer: d
Explanation: Considering the features of network components, Hubs and Repeaters are similar to certain extent. Hubs act as multiport repeaters. Repeaters help in regeneration of data signal flowing through a network when it enters a new network. Thus it is incorporated in LANs for connecting hubs.

7. In bridged networks _________ algorithm is used for bridging token-ring LANs.
a) Backward learning
b) Source-routing
c) Spanning-tree
d) Distance Vector Routing
View Answer

Answer: b
Explanation: In Source-routing algorithm, the source or the sender is allowed to specify the path or address of the destination. It also dynamically filters traffic, protocols and interfaces. It is used for bridging token-ring segments.
advertisement

8. The transparent bridge learns routing information by a ______ learning process.
a) upward
b) backward
c) forward
d) downward
View Answer

Answer: b
Explanation: A transparent bridge is also known as adaptive bridge. It uses backward learning process to gain routing information. It keeps information about all the nodes connected to specific ports.

9. Source Routing Bridge is more reliable as compared to Transparent Bridge.
a) True
b) False
View Answer

Answer: b
Explanation: The Source Routing Bridge is faster and that makes it less reliable. The Transparent Bridge on the other hand proves to be more robust and reliable. Source routing bridge is a heavy resource consuming network component.
advertisement

10. Which protocol is used by the router to determine the port associated with the destination address?
a) Simple Network Management Protocol (SNMP)
b) Border Gateway Protocol (BGP)
c) Routing Information Protocol (RIP)
d) Address Resolution Protocol (ARP)
View Answer

Answer: d
Explanation: Address Resolution Protocol (ARP) is applied on the Network Layer. A router also operates in the same layer. Thus a router uses ARP for its applications. It is used for mapping MAC address with IP address.

11. A ___________ combines two autonomous networks.
a) router
b) repeater
c) modem
d) gateway
View Answer

Answer: d
Explanation: In an autonomous network, it is very important for the data to flow from one discrete network to the other and to convey the same meaning at every network. Thus, gateway is a network node component that helps in translating one protocol to the other and connects two completely independent networks.

12. __________ is an alternative to the use of gateway to communicate between autonomous networks, using multiprotocol router.
a) Routing
b) Tunneling
c) Balancing
d) Switching
View Answer

Answer: b
Explanation: Tunneling is a process used when the source and the destination are on the same network. Though different protocols are to be applied while data traverses through dissimilar networks, protocol conversion is not implemented here. Instead, the data frames are encapsulated and transmitted through the networks.

13. __________ is a routing technique deployed in the Edge Routers.
a) Multiprotocol Label Switching (MPLS)
b) Fixed weighted
c) Round Robin
d) Adaptive balancing
View Answer

Answer: a
Explanation: The name edge router arises from the fact that edge routers generally operates on the edge of a network. MPLS is a routing technique that is used by Edge routers and these routers are termed as MPLS Edge routers. Whereas Fixed weighted, Round Robin and Adaptive balancing are load balancing techniques and not routing techniques.

Sanfoundry Global Education & Learning Series – Computer Network Management.

To practice all areas of Computer Network Management, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.