Networking Questions and Answers – Topologies

This set of Network Security Interview Questions and Answers focuses on “Topologies”.

1. Which network topology does this represent?
The figure represents the mesh topology

a) Mesh
b) Star
c) Bus
d) Ring
View Answer

Answer: a
Explanation: The figure represents the mesh topology.

2. ‘Jitter’ refers to-
a) errorless delivery
b) variation in the packet arrival time
c) timely delivery of message
d) none of the mentioned
View Answer

Answer: b
Explanation: ‘Jitter’ refers to variation in the packet arrival time.
advertisement
advertisement

3. 2 Half duplex systems can make a Full-Duplex.
a) True
b) False
View Answer

Answer: a
Explanation: The statement is true.

4. Which topology requires the most amount of wiring?
a) Mesh
b) Star
c) Bus
d) Ring
View Answer

Answer: a
Explanation: This is the disadvantage of mesh topology.
Sanfoundry Certification Contest of the Month is Live. 100+ Subjects. Participate Now!

5. How many links are there for N nodes in the mesh topology?
a) 1
b) N(N+1)/2
c) N
d) N(N-1)/2
View Answer

Answer: d
Explanation: There are N(N-1)/2 links for N nodes.

6. Which topology has a central hub?
a) Mesh
b) Star
c) Bus
d) Ring
View Answer

Answer: b
Explanation: The star topology has a single hub.
advertisement

7. Which topology has the toughest fault identification?
a) Mesh
b) Star
c) Bus
d) Ring
View Answer

Answer: c
Explanation: In the bus topology, fault identification is tougher.

8. Ethernet LANs use which topology?
a) Mesh
b) Star
c) Bus
d) Ring
View Answer

Answer: c
Explanation: Ethernet LANs use bus topology,
advertisement

9. Which topology uses the token passing algorithm?
a) Mesh
b) Star
c) Bus
d) Ring
View Answer

Answer: d
Explanation: The ring topology uses the token passing algorithm. The token holder gets its turn at communication.

10. How many lines are required for the bus topology?
a) N(N-1)/2
b) N
c) N+1
d) none of the mentioned
View Answer

Answer: c
Explanation: N drop lines and 1 bus line.

11. A list of protocols used is known as –
a) protocol access
b) protocol stack
c) permutation stack
d) none of the mentioned
View Answer

Answer: b
Explanation: A list of the protocols used by a certain system, one protocol per layer, is called a protocol stack.

12. In order to prevent a fast sender from swamping a slow receiver with data, feedback is often used. This process is known as-
a) flow control
b) multiplexing
c) congestion
d) none of the mentioned
View Answer

Answer: a
Explanation: The process defined above is known as Flow Control.

Sanfoundry Global Education & Learning Series – Cryptography and Network Security.

To practice all areas of Network Security for Interviews, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.