Networking Questions and Answers – Topologies

This set of Network Security Multiple Choice Questions & Answers (MCQs) focuses on “Topologies”.

1. Which network topology does this represent?
The figure represents the mesh topology

a) Mesh
b) Star
c) Bus
d) Ring
View Answer

Answer: a
Explanation: The figure represents the mesh topology.

2. ‘Jitter’ refers to-
a) errorless delivery
b) variation in the packet arrival time
c) timely delivery of message
d) none of the mentioned
View Answer

Answer: b
Explanation: ‘Jitter’ refers to variation in the packet arrival time.
advertisement

3. 2 Half duplex systems can make a Full-Duplex.
a) True
b) False
View Answer

Answer: a
Explanation: The statement is true.

4. Which topology requires the most amount of wiring?
a) Mesh
b) Star
c) Bus
d) Ring
View Answer

Answer: a
Explanation: This is the disadvantage of mesh topology.
Free 30-Day C Certification Bootcamp is Live. Join Now!

5. How many links are there for N nodes in the mesh topology?
a) 1
b) N(N+1)/2
c) N
d) N(N-1)/2
View Answer

Answer: d
Explanation: There are N(N-1)/2 links for N nodes.

6. Which topology has a central hub?
a) Mesh
b) Star
c) Bus
d) Ring
View Answer

Answer: b
Explanation: The star topology has a single hub.

7. Which topology has the toughest fault identification?
a) Mesh
b) Star
c) Bus
d) Ring
View Answer

Answer: c
Explanation: In the bus topology, fault identification is tougher.

8. Ethernet LANs use which topology?
a) Mesh
b) Star
c) Bus
d) Ring
View Answer

Answer: c
Explanation: Ethernet LANs use bus topology,
advertisement

9. Which topology uses the token passing algorithm?
a) Mesh
b) Star
c) Bus
d) Ring
View Answer

Answer: d
Explanation: The ring topology uses the token passing algorithm. The token holder gets its turn at communication.

10. How many lines are required for the bus topology?
a) N(N-1)/2
b) N
c) N+1
d) none of the mentioned
View Answer

Answer: c
Explanation: N drop lines and 1 bus line.

11. A list of protocols used is known as –
a) protocol access
b) protocol stack
c) permutation stack
d) none of the mentioned
View Answer

Answer: b
Explanation: A list of the protocols used by a certain system, one protocol per layer, is called a protocol stack.

12. In order to prevent a fast sender from swamping a slow receiver with data, feedback is often used. This process is known as-
a) flow control
b) multiplexing
c) congestion
d) none of the mentioned
View Answer

Answer: a
Explanation: The process defined above is known as Flow Control.

Sanfoundry Global Education & Learning Series – Cryptography and Network Security.

To practice all areas of Cryptography and Network Security, here is complete set of 1000+ Multiple Choice Questions and Answers.

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.