McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) .
1. |
Third generation of firewall offers_ to prevent web fingerprint attacks. |
A. | web application firewall |
B. | packet filter |
C. | stateful filter |
D. | none of them |
Answer» A. web application firewall |
2. |
The identity management system binds logical addresses to for reputed servers. |
A. | mac address |
B. | specific programs |
C. | other computers |
D. | none of them |
Answer» A. mac address |
3. |
IPS in firewall stands for . |
A. | intrusion protection system |
B. | intrusion prevention software |
C. | internet prevention system |
D. | intrusion prevention system |
Answer» D. intrusion prevention system |
4. |
Third generation firewalls were otherwise called . |
A. | packet filters |
B. | stateful filters |
C. | application filters |
D. | none of them |
Answer» C. application filters |
5. |
Second generation firewalls were otherwise called . |
A. | packet filters |
B. | stateful filters |
C. | application filters |
D. | none of them |
Answer» B. stateful filters |
6. |
First generation firewalls were otherwise called . |
A. | packet filters |
B. | stateful filters |
C. | application filters |
D. | none of them |
Answer» A. packet filters |
7. |
Third general firewalls operated at layer of the OSI model. |
A. | 3 |
B. | 4 |
C. | 5 |
D. | 7 |
Answer» D. 7 |
8. |
Second general firewalls operated at layer of the OSI model. |
A. | 3 |
B. | 4 |
C. | 5 |
D. | 7 |
Answer» B. 4 |
9. |
First general firewalls operated at layer of the OSI model. |
A. | 3 |
B. | 4 |
C. | 5 |
D. | 7 |
Answer» A. 3 |
10. |
Filtering connections and disallowing prohibited connections is carried out using . |
A. | modem |
B. | router |
C. | firewall |
D. | bridge |
Answer» C. firewall |
11. |
Connection to the Internet requires enforcement of security. |
A. | low |
B. | high |
C. | zero |
D. | no |
Answer» B. high |
12. |
The address 2001:db8:a0b:12f0::1 is formatted in . |
A. | ipv0 |
B. | ipv2 |
C. | ipv4 |
D. | ipv6 |
Answer» D. ipv6 |
13. |
Internet is constituted of . |
A. | network of networks |
B. | hard disk |
C. | dvd |
D. | pen drive |
Answer» A. network of networks |
14. |
Computers and devices can be connected using technology to create a network. |
A. | wired |
B. | wireless |
C. | both a & b |
D. | neither a nor b |
Answer» C. both a & b |
15. |
Most of the wired network connections use . |
A. | optical fibre cable (ofc) |
B. | usb cable |
C. | pen drive |
D. | hard drive |
Answer» A. optical fibre cable (ofc) |
16. |
The port for connecting broadband cable to a computer is called . |
A. | ethernet port |
B. | registered jack 45 (rj-45) |
C. | both a & b |
D. | none of them |
Answer» C. both a & b |
17. |
Wireless network connections use technologies. |
A. | wireless fidelity (wifi) |
B. | bluetooth |
C. | both a & b |
D. | neither a nor b |
Answer» C. both a & b |
18. |
are the hardware devices that help the computer to connect to a network. |
A. | routers |
B. | modems |
C. | wireless modems |
D. | all of them |
Answer» D. all of them |
19. |
MODEM stands for . |
A. | modulation democracy |
B. | modulation demodulation |
C. | modern demodulation |
D. | moderate demodulation |
Answer» B. modulation demodulation |
20. |
Routers help in . |
A. | transmission of data between networks |
B. | connecting different devices using appropriate protocol |
C. | both a & b |
D. | neither a nor b |
Answer» C. both a & b |
21. |
IP address helps to a computer connected to a network. |
A. | uniquely identify |
B. | format |
C. | reset |
D. | reject |
Answer» A. uniquely identify |
22. |
Port number on a computer host connected to a network denotes a . |
A. | background server program |
B. | client program |
C. | both a & b |
D. | none of them |
Answer» C. both a & b |
23. |
A program which runs in the background and sends results requested by a client is called a . |
A. | server |
B. | client |
C. | port |
D. | ip address |
Answer» A. server |
24. |
Firewall can . |
A. | deny access to specific sites |
B. | allow access to only white listed sites |
C. | both a & b |
D. | none of them |
Answer» C. both a & b |
25. |
Firewall can be implemented through . |
A. | hardware |
B. | software |
C. | both a & b |
D. | none of them |
Answer» C. both a & b |
26. |
The design adopted for connecting several hosts on a network is called . |
A. | telephony |
B. | wiring |
C. | connection |
D. | topology |
Answer» D. topology |
27. |
When 2 devices are connected through a dedicated line, it is topology. |
A. | point to point |
B. | bus |
C. | star |
D. | ring |
Answer» A. point to point |
28. |
When all nodes are connected to a central hub, it is topology. |
A. | point to point |
B. | bus |
C. | star |
D. | ring |
Answer» C. star |
29. |
Usually, the network connecting hosts inside a single building is called . |
A. | lan |
B. | wan |
C. | man |
D. | none of them |
Answer» A. lan |
30. |
Usually, the network connecting hosts located in several cities or nations is called . |
A. | lan |
B. | wan |
C. | man |
D. | none of them |
Answer» B. wan |
31. |
When network hosts are connected without wires, protocol is used. |
A. | lan |
B. | wan |
C. | man |
D. | wlan |
Answer» D. wlan |
32. |
MODEM is a device used for converting . |
A. | digital signal to analog |
B. | analog signal to digital |
C. | both a & b |
D. | neither a nor b |
Answer» C. both a & b |
33. |
MODEM is used to convey data over . |
A. | air |
B. | telephone line |
C. | train track |
D. | bus route |
Answer» B. telephone line |
34. |
Hub is to switch/ bridge since it repeats data even to the unwanted connections. |
A. | inferior |
B. | superior |
C. | equivalent |
D. | none of them |
Answer» A. inferior |
35. |
Switch is to a hub since unwanted repetitions are curtailed. |
A. | inferior |
B. | superior |
C. | equivalent |
D. | none of them |
Answer» B. superior |
36. |
The device which connects one Local Area Network to another Local Area Network is called |
A. | hub |
B. | switch |
C. | modem |
D. | bridge |
Answer» D. bridge |
37. |
A cable with single copper core and braided metal shield is called . |
A. | unshielded twisted cable |
B. | shielded twisted cable |
C. | coaxial cable |
D. | fibre optic cable |
Answer» C. coaxial cable |
38. |
Fibre optic cables are interferences from electric cables and electromagnetic waves. |
A. | prone to |
B. | unaffected by |
C. | susceptible to |
D. | affected by |
Answer» B. unaffected by |
39. |
Wireless networks communicate using signal instead of cables. |
A. | infrared |
B. | low frequency radio wave |
C. | wireless fidelity (wifi - ieee 802.11 standard) |
D. | all of them |
Answer» D. all of them |
40. |
In the modern days, is the best choice for wireless networking. |
A. | wifi |
B. | infrared |
C. | radio waves |
D. | micro-wave |
Answer» A. wifi |
41. |
Wireless networks are wired networks. |
A. | slower than |
B. | faster than |
C. | as fast as |
D. | none of them |
Answer» A. slower than |
42. |
In terms of data safety, wireless networks are wired networks. |
A. | more secure than |
B. | less secure than |
C. | as safe as |
D. | none of them |
Answer» B. less secure than |
43. |
Normally, WiFi signal reach m distance. |
A. | 50 to 100m |
B. | 1 to 2m |
C. | 0.5 to 1.0m |
D. | 2 to 3m |
Answer» A. 50 to 100m |
44. |
WiFi networks have for connecting. |
A. | name |
B. | password |
C. | both a & b |
D. | none of them |
Answer» C. both a & b |
45. |
Name of a WiFi network may be . |
A. | visible |
B. | invisible |
C. | both a & b |
D. | none of them |
Answer» C. both a & b |
46. |
Open WiFi networks have . |
A. | a visible name |
B. | no password |
C. | visible name without any password |
D. | none of them |
Answer» D. none of them |
47. |
The network established using Bluetooth technology is called a . |
A. | local area network (lan) |
B. | wide area network (wan) |
C. | metropolitan area network (man) |
D. | personal area network (pan) |
Answer» D. personal area network (pan) |
48. |
Bluetooth permits . |
A. | pairing by acceptance |
B. | pairing by password authentication |
C. | pairing by verification |
D. | all of them |
Answer» D. all of them |
49. |
UDP stands for . |
A. | unified datagram protocol |
B. | user datagram protocol |
C. | user datagram procedure |
D. | user digital protocol |
Answer» B. user datagram protocol |
50. |
allows for mapping IP address to an ethernet or hardware address. |
A. | address resolution protocol (arp) |
B. | reverse address resolution protocol (rarp) |
C. | open system interconnection (osi) |
D. | none of them |
Answer» A. address resolution protocol (arp) |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.