February 12, 2016

IBPS SO (IT Officer) Professional Knowledge Computer Networking Questions Set

Dear Readers,

Here we are presenting you the model practice questions set form Computer Networking section for the upcoming IBPS Specialist Officers (IT Officers) Exam.As you know Computer Networking is one of the important section of IBPS IT Officers Exam so you have to focus more on it.We have also included some important questions that are repeatedly asked in previous IBPS and SBI IT Officers exams.Hope you all like the post !!

  • The OSI model consists of a - Seven Layer 
  • Packets are related to - Network Layer
  • End to end connectivity is provided from host to host in - Transport Layer
  • Encryption and decryption are functions of the - Presentation Layer
  • In OSI model the Layer Provides an interface between the system and the user - Application Layer
  • In OSI model Repater operates in - Physical Layer
  • In OSI model Bridge operate in - Data link Layer and Physical Layer
  • In OSI model Routers operate in - Network Layer
  • In OSI model Sockets are used in - Transport Layer
  • Two different kind of networks can be connected by using - Gateway
  • A standard for security that is located at the network or packet processing layer of network communications as opposed to the appliincation layer is - IPsec
  • TCP/IP defines two protocols Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) - Transport Layer
  • The switching methods which provides the greatest frame throughput - Cut-through switching
  • An association to develop advanced Internet technology is - Internet 2
  • The protocol is used in eliminate loops - Spanning Tree Protocol
  • The continuous ability to send and receive data between interconnected networks is - Network Interoperability
  • A communication network which is used by large organization over regional, national and gobal area is called - Wide area network (WAN)
  • Internet like networks within enterprises - Intranets
  • A central computer surrounded by one or more satellite computers is called a - Star network
  • Encryption / decryption provides a netwok with - Privacy
  • To prohibit unauthorized access to your computer via the Internet by using - Firewall
  • The wildcard masks is most useful for matchin all IP packets in subnet, mask is -
  • One of the oldest and slowest methods an intruder might use to scan a network to determine which of a range of IP addresses map live hosts is - Ping sweep
  • A command used to test a device on a network whether it is reachable - Ping command
  • The name given to the exchange of control signals which is neccessary for establishing a connection between a modem and a computer at one end of line and another modem and computer at the other end - Handshaking
  • The scheme is used for mapping host names and email destinations to IP addresses - DNS