A. Malware
B. Firewall
C. Ransomware
D. Mobile secure gateway
Explanation: Firewall is an entity that is a network security component but it is also considered as a network node. Malware and Ransomware are generally cyber security threats and do not qualify under network security components. Mobile secure gateway on the other is a defense method against cyber threats and is not a network node.
A. Packet
B. Circuit
C. Segment
D. Frame
Explanation: When a group of data is transmitted from a source to its destination in the form of packets then that process is termed as packet switching. Bridges are one such network node which uses packet switching as their transmission method. They are used for connecting LANs.
A. True
B. False
C.
D.
Explanation: This given statement is false. Router is a network node component that operates on Network Layer. It helps in sending the data packets to the destination network. It provides appropriate direction to the data packets in network.
A. Distance vector routing
B. Backward learning
C. Spanning-tree
D. Link state routing
Explanation: Transparent bridges maintain a routing table. This table comprises of MAC (Media Access Control) addresses. It connects two LANs. It acts transparent to other networks thus the name Transparent bridge is justified. It maintains the information regarding traffic in a particular network. Transparent Bridges are used generally in Ethernet. Thus Spanning-tree algorithm is used in transparent bridge.
A. Switches
B. Routers
C. Modem
D. Repeaters
Explanation: Considering the features of network components, Hubs and Repeaters are similar to certain extent. Hubs act as multiport repeaters. Repeaters help in regeneration of data signal flowing through a network when it enters a new network. Thus it is incorporated in LANs for connecting hubs.
A. Backward learning
B. Source-routing
C. Spanning-tree
D. Distance vector routing
Explanation: In Source-routing algorithm, the source or the sender is allowed to specify the path or address of the destination. It also dynamically filters traffic, protocols and interfaces. It is used for bridging token-ring segments.
A. Upward
B. Backward
C. Forward
D. Downward
Explanation: A transparent bridge is also known as adaptive bridge. It uses backward learning process to gain routing information. It keeps information about all the nodes connected to specific ports.
A. True
B. False
C.
D.
Explanation: The Source Routing Bridge is faster and that makes it less reliable. The Transparent Bridge on the other hand proves to be more robust and reliable. Source routing bridge is a heavy resource consuming network component.
A. Simple network management protocol (snmp)
B. Border gateway protocol (bgp)
C. Routing information protocol (rip)
D. Address resolution protocol (arp)
Explanation: Address Resolution Protocol (ARP) is applied on the Network Layer. A router also operates in the same layer. Thus a router uses ARP for its applications. It is used for mapping MAC address with IP address.
A. Router
B. Repeater
C. Modem
D. Gateway
Explanation: In an autonomous network, it is very important for the data to flow from one discrete network to the other and to convey the same meaning at every network. Thus, gateway is a network node component that helps in translating one protocol to the other and connects two completely independent networks.