Computer Network Management » Network Node Components
____________ is considered as a network node and also network security.

A. Malware
B. Firewall
C. Ransomware
D. Mobile secure gateway

Explanation: Firewall is an entity that is a network security component but it is also considered as a network node. Malware and Ransomware are generally cyber security threats and do not qualify under network security components. Mobile secure gateway on the other is a defense method against cyber threats and is not a network node.

At the Data Link layer, Bridge acts as an intelligent __________ switch.

A. Packet
B. Circuit
C. Segment
D. Frame

Explanation: When a group of data is transmitted from a source to its destination in the form of packets then that process is termed as packet switching. Bridges are one such network node which uses packet switching as their transmission method. They are used for connecting LANs.

Router works at the transport layer of OSI Model.

A. True
B. False
C.
D.

Explanation: This given statement is false. Router is a network node component that operates on Network Layer. It helps in sending the data packets to the destination network. It provides appropriate direction to the data packets in network.

The routing algorithm used by transparent bridge is __________ algorithm.

A. Distance vector routing
B. Backward learning
C. Spanning-tree
D. Link state routing

Explanation: Transparent bridges maintain a routing table. This table comprises of MAC (Media Access Control) addresses. It connects two LANs. It acts transparent to other networks thus the name Transparent bridge is justified. It maintains the information regarding traffic in a particular network. Transparent Bridges are used generally in Ethernet. Thus Spanning-tree algorithm is used in transparent bridge.

In a LAN configuration, hubs can be seen as a DTE (Data Terminal Equipment) that are connected using _______

A. Switches
B. Routers
C. Modem
D. Repeaters

Explanation: Considering the features of network components, Hubs and Repeaters are similar to certain extent. Hubs act as multiport repeaters. Repeaters help in regeneration of data signal flowing through a network when it enters a new network. Thus it is incorporated in LANs for connecting hubs.

In bridged networks _________ algorithm is used for bridging token-ring LANs.

A. Backward learning
B. Source-routing
C. Spanning-tree
D. Distance vector routing

Explanation: In Source-routing algorithm, the source or the sender is allowed to specify the path or address of the destination. It also dynamically filters traffic, protocols and interfaces. It is used for bridging token-ring segments.

The transparent bridge learns routing information by a ______ learning process.

A. Upward
B. Backward
C. Forward
D. Downward

Explanation: A transparent bridge is also known as adaptive bridge. It uses backward learning process to gain routing information. It keeps information about all the nodes connected to specific ports.

Source Routing Bridge is more reliable as compared to Transparent Bridge.

A. True
B. False
C.
D.

Explanation: The Source Routing Bridge is faster and that makes it less reliable. The Transparent Bridge on the other hand proves to be more robust and reliable. Source routing bridge is a heavy resource consuming network component.

Which protocol is used by the router to determine the port associated with the destination address?

A. Simple network management protocol (snmp)
B. Border gateway protocol (bgp)
C. Routing information protocol (rip)
D. Address resolution protocol (arp)

Explanation: Address Resolution Protocol (ARP) is applied on the Network Layer. A router also operates in the same layer. Thus a router uses ARP for its applications. It is used for mapping MAC address with IP address.

A ___________ combines two autonomous networks.

A. Router
B. Repeater
C. Modem
D. Gateway

Explanation: In an autonomous network, it is very important for the data to flow from one discrete network to the other and to convey the same meaning at every network. Thus, gateway is a network node component that helps in translating one protocol to the other and connects two completely independent networks.