McqMate
1. |
Third generation of firewall offers_ to prevent web fingerprint attacks. |
A. | web application firewall |
B. | packet filter |
C. | stateful filter |
D. | none of them |
Answer» A. web application firewall |
2. |
The identity management system binds logical addresses to for reputed servers. |
A. | mac address |
B. | specific programs |
C. | other computers |
D. | none of them |
Answer» A. mac address |
3. |
IPS in firewall stands for . |
A. | intrusion protection system |
B. | intrusion prevention software |
C. | internet prevention system |
D. | intrusion prevention system |
Answer» D. intrusion prevention system |
4. |
Third generation firewalls were otherwise called . |
A. | packet filters |
B. | stateful filters |
C. | application filters |
D. | none of them |
Answer» C. application filters |
5. |
Second generation firewalls were otherwise called . |
A. | packet filters |
B. | stateful filters |
C. | application filters |
D. | none of them |
Answer» B. stateful filters |
6. |
First generation firewalls were otherwise called . |
A. | packet filters |
B. | stateful filters |
C. | application filters |
D. | none of them |
Answer» A. packet filters |
7. |
Third general firewalls operated at layer of the OSI model. |
A. | 3 |
B. | 4 |
C. | 5 |
D. | 7 |
Answer» D. 7 |
8. |
Second general firewalls operated at layer of the OSI model. |
A. | 3 |
B. | 4 |
C. | 5 |
D. | 7 |
Answer» B. 4 |
9. |
First general firewalls operated at layer of the OSI model. |
A. | 3 |
B. | 4 |
C. | 5 |
D. | 7 |
Answer» A. 3 |
10. |
Filtering connections and disallowing prohibited connections is carried out using . |
A. | modem |
B. | router |
C. | firewall |
D. | bridge |
Answer» C. firewall |
11. |
Connection to the Internet requires enforcement of security. |
A. | low |
B. | high |
C. | zero |
D. | no |
Answer» B. high |
12. |
The address 2001:db8:a0b:12f0::1 is formatted in . |
A. | ipv0 |
B. | ipv2 |
C. | ipv4 |
D. | ipv6 |
Answer» D. ipv6 |
13. |
Internet is constituted of . |
A. | network of networks |
B. | hard disk |
C. | dvd |
D. | pen drive |
Answer» A. network of networks |
14. |
Computers and devices can be connected using technology to create a network. |
A. | wired |
B. | wireless |
C. | both a & b |
D. | neither a nor b |
Answer» C. both a & b |
15. |
Most of the wired network connections use . |
A. | optical fibre cable (ofc) |
B. | usb cable |
C. | pen drive |
D. | hard drive |
Answer» A. optical fibre cable (ofc) |
16. |
The port for connecting broadband cable to a computer is called . |
A. | ethernet port |
B. | registered jack 45 (rj-45) |
C. | both a & b |
D. | none of them |
Answer» C. both a & b |
17. |
Wireless network connections use technologies. |
A. | wireless fidelity (wifi) |
B. | bluetooth |
C. | both a & b |
D. | neither a nor b |
Answer» C. both a & b |
18. |
are the hardware devices that help the computer to connect to a network. |
A. | routers |
B. | modems |
C. | wireless modems |
D. | all of them |
Answer» D. all of them |
19. |
MODEM stands for . |
A. | modulation democracy |
B. | modulation demodulation |
C. | modern demodulation |
D. | moderate demodulation |
Answer» B. modulation demodulation |
20. |
Routers help in . |
A. | transmission of data between networks |
B. | connecting different devices using appropriate protocol |
C. | both a & b |
D. | neither a nor b |
Answer» C. both a & b |
21. |
IP address helps to a computer connected to a network. |
A. | uniquely identify |
B. | format |
C. | reset |
D. | reject |
Answer» A. uniquely identify |
22. |
Port number on a computer host connected to a network denotes a . |
A. | background server program |
B. | client program |
C. | both a & b |
D. | none of them |
Answer» C. both a & b |
23. |
A program which runs in the background and sends results requested by a client is called a . |
A. | server |
B. | client |
C. | port |
D. | ip address |
Answer» A. server |
24. |
Firewall can . |
A. | deny access to specific sites |
B. | allow access to only white listed sites |
C. | both a & b |
D. | none of them |
Answer» C. both a & b |
25. |
Firewall can be implemented through . |
A. | hardware |
B. | software |
C. | both a & b |
D. | none of them |
Answer» C. both a & b |
26. |
The design adopted for connecting several hosts on a network is called . |
A. | telephony |
B. | wiring |
C. | connection |
D. | topology |
Answer» D. topology |
27. |
When 2 devices are connected through a dedicated line, it is topology. |
A. | point to point |
B. | bus |
C. | star |
D. | ring |
Answer» A. point to point |
28. |
When all nodes are connected to a central hub, it is topology. |
A. | point to point |
B. | bus |
C. | star |
D. | ring |
Answer» C. star |
29. |
Usually, the network connecting hosts inside a single building is called . |
A. | lan |
B. | wan |
C. | man |
D. | none of them |
Answer» A. lan |
30. |
Usually, the network connecting hosts located in several cities or nations is called . |
A. | lan |
B. | wan |
C. | man |
D. | none of them |
Answer» B. wan |
31. |
When network hosts are connected without wires, protocol is used. |
A. | lan |
B. | wan |
C. | man |
D. | wlan |
Answer» D. wlan |
32. |
MODEM is a device used for converting . |
A. | digital signal to analog |
B. | analog signal to digital |
C. | both a & b |
D. | neither a nor b |
Answer» C. both a & b |
33. |
MODEM is used to convey data over . |
A. | air |
B. | telephone line |
C. | train track |
D. | bus route |
Answer» B. telephone line |
34. |
Hub is to switch/ bridge since it repeats data even to the unwanted connections. |
A. | inferior |
B. | superior |
C. | equivalent |
D. | none of them |
Answer» A. inferior |
35. |
Switch is to a hub since unwanted repetitions are curtailed. |
A. | inferior |
B. | superior |
C. | equivalent |
D. | none of them |
Answer» B. superior |
36. |
The device which connects one Local Area Network to another Local Area Network is called |
A. | hub |
B. | switch |
C. | modem |
D. | bridge |
Answer» D. bridge |
37. |
A cable with single copper core and braided metal shield is called . |
A. | unshielded twisted cable |
B. | shielded twisted cable |
C. | coaxial cable |
D. | fibre optic cable |
Answer» C. coaxial cable |
38. |
Fibre optic cables are interferences from electric cables and electromagnetic waves. |
A. | prone to |
B. | unaffected by |
C. | susceptible to |
D. | affected by |
Answer» B. unaffected by |
39. |
Wireless networks communicate using signal instead of cables. |
A. | infrared |
B. | low frequency radio wave |
C. | wireless fidelity (wifi - ieee 802.11 standard) |
D. | all of them |
Answer» D. all of them |
40. |
In the modern days, is the best choice for wireless networking. |
A. | wifi |
B. | infrared |
C. | radio waves |
D. | micro-wave |
Answer» A. wifi |
41. |
Wireless networks are wired networks. |
A. | slower than |
B. | faster than |
C. | as fast as |
D. | none of them |
Answer» A. slower than |
42. |
In terms of data safety, wireless networks are wired networks. |
A. | more secure than |
B. | less secure than |
C. | as safe as |
D. | none of them |
Answer» B. less secure than |
43. |
Normally, WiFi signal reach m distance. |
A. | 50 to 100m |
B. | 1 to 2m |
C. | 0.5 to 1.0m |
D. | 2 to 3m |
Answer» A. 50 to 100m |
44. |
WiFi networks have for connecting. |
A. | name |
B. | password |
C. | both a & b |
D. | none of them |
Answer» C. both a & b |
45. |
Name of a WiFi network may be . |
A. | visible |
B. | invisible |
C. | both a & b |
D. | none of them |
Answer» C. both a & b |
46. |
Open WiFi networks have . |
A. | a visible name |
B. | no password |
C. | visible name without any password |
D. | none of them |
Answer» D. none of them |
47. |
The network established using Bluetooth technology is called a . |
A. | local area network (lan) |
B. | wide area network (wan) |
C. | metropolitan area network (man) |
D. | personal area network (pan) |
Answer» D. personal area network (pan) |
48. |
Bluetooth permits . |
A. | pairing by acceptance |
B. | pairing by password authentication |
C. | pairing by verification |
D. | all of them |
Answer» D. all of them |
49. |
UDP stands for . |
A. | unified datagram protocol |
B. | user datagram protocol |
C. | user datagram procedure |
D. | user digital protocol |
Answer» B. user datagram protocol |
50. |
allows for mapping IP address to an ethernet or hardware address. |
A. | address resolution protocol (arp) |
B. | reverse address resolution protocol (rarp) |
C. | open system interconnection (osi) |
D. | none of them |
Answer» A. address resolution protocol (arp) |
51. |
is the version of Internet Protocol now being phased out. |
A. | ip version 1 (ipv1) |
B. | ip version 2 (ipv2) |
C. | ip version 4 (ipv4) |
D. | ip version 6 (ipv6) |
Answer» C. ip version 4 (ipv4) |
52. |
IPV4 addresses have a by numeric address. |
A. | 4 |
B. | 6 |
C. | 8 |
D. | 16 |
Answer» A. 4 |
53. |
In a client server network, the ports in the range of 0 to 1023 are called ports. |
A. | relational ports |
B. | general ports |
C. | well known ports |
D. | user ports |
Answer» C. well known ports |
54. |
Network protocols are standardized through . |
A. | request for comment (rfc) |
B. | |
C. | web server |
D. | telnet |
Answer» A. request for comment (rfc) |
55. |
RFC in networking stands for . |
A. | rejection for comment |
B. | request for comment |
C. | request for contest |
D. | request freight comment |
Answer» B. request for comment |
56. |
TCP/IP port number 7 is assigned for protocol. |
A. | daytime |
B. | echo |
C. | quote of the day |
D. | message send |
Answer» B. echo |
57. |
TCP/IP port number 13 is assigned for protocol. |
A. | daytime |
B. | echo |
C. | quote of the day |
D. | message send |
Answer» A. daytime |
58. |
TCP/IP port number 17 is assigned for protocol. |
A. | daytime |
B. | echo |
C. | quote of the day |
D. | message send |
Answer» C. quote of the day |
59. |
TCP/IP port number 18 is assigned for protocol. |
A. | daytime |
B. | echo |
C. | quote of the day |
D. | message send |
Answer» D. message send |
60. |
TCP/IP port number 20 is assigned for . |
A. | telnet |
B. | simple mail transfer protocol (smtp) |
C. | file transfer protocol protocol (ftp) |
D. | trivial file transfer protocol (tftp) |
Answer» C. file transfer protocol protocol (ftp) |
61. |
TCP/IP port number 23 is assigned for . |
A. | telnet |
B. | simple mail transfer protocol (smtp) |
C. | file transfer protocol protocol (ftp) |
D. | trivial file transfer protocol (tftp) |
Answer» A. telnet |
62. |
TCP/IP port number 25 is assigned for . |
A. | telnet |
B. | simple mail transfer protocol (smtp) |
C. | file transfer protocol protocol (ftp) |
D. | trivial file transfer protocol (tftp) |
Answer» B. simple mail transfer protocol (smtp) |
63. |
TCP/IP port number 69 is assigned for . |
A. | telnet |
B. | simple mail transfer protocol (smtp) |
C. | file transfer protocol protocol (ftp) |
D. | trivial file transfer protocol (tftp) |
Answer» D. trivial file transfer protocol (tftp) |
64. |
TCP/IP port number 80 is assigned for . |
A. | hyper text transfer protocol (http) |
B. | post office protocol (pop) |
C. | structured query language (sql) |
D. | network news transfer protocol (nntp) |
Answer» A. hyper text transfer protocol (http) |
65. |
TCP/IP port number 109 is assigned for . |
A. | hyper text transfer protocol (http) |
B. | post office protocol (pop) |
C. | structured query language (sql) |
D. | network news transfer protocol (nntp) |
Answer» B. post office protocol (pop) |
66. |
TCP/IP port number 118/ 156 is assigned for . |
A. | hyper text transfer protocol (http) |
B. | post office protocol (pop) |
C. | structured query language (sql) |
D. | network news transfer protocol (nntp) |
Answer» C. structured query language (sql) |
67. |
TCP/IP port number 119/ 443 is assigned for . |
A. | hyper text transfer protocol (http) |
B. | post office protocol (pop) |
C. | structured query language (sql) |
D. | network news transfer protocol (nntp) |
Answer» D. network news transfer protocol (nntp) |
68. |
TCP/IP port number 143/ 220 is assigned for . |
A. | internet message access protocol (imap) |
B. | simple network management protocol (snmp) |
C. | internet relay chat (irc) |
D. | precision time protocol (ptp) |
Answer» A. internet message access protocol (imap) |
69. |
TCP/IP port number 161 is assigned for . |
A. | internet message access protocol (imap) |
B. | simple network management protocol (snmp) |
C. | internet relay chat (irc) |
D. | precision time protocol (ptp) |
Answer» B. simple network management protocol (snmp) |
70. |
TCP/IP port number 443 is assigned for . |
A. | http over secure socket layer https |
B. | remote procedure call (rpc) |
C. | dynamic host configuration protocol (dhcp) |
D. | internet message access protocol over secure socket layer (imaps) |
Answer» A. http over secure socket layer https |
71. |
TCP/IP port number 530 is assigned for . |
A. | http over secure socket layer https |
B. | remote procedure call (rpc) |
C. | dynamic host configuration protocol (dhcp) |
D. | internet message access protocol over secure socket layer (imaps) |
Answer» B. remote procedure call (rpc) |
72. |
TCP/IP port number 546/ 547 is assigned for . |
A. | http over secure socket layer https |
B. | remote procedure call (rpc) |
C. | dynamic host configuration protocol (dhcp) |
D. | internet message access protocol over secure socket layer (imaps) |
Answer» C. dynamic host configuration protocol (dhcp) |
73. |
TCP/IP port number 993 is assigned for . |
A. | http over secure socket layer https |
B. | remote procedure call (rpc) |
C. | dynamic host configuration protocol (dhcp) |
D. | internet message access protocol over secure socket layer (imaps) |
Answer» D. internet message access protocol over secure socket layer (imaps) |
74. |
The FTP server which does not require login process is called . |
A. | hyper text transmission protocol |
B. | simple mail transfer protocol |
C. | network time protocol |
D. | anonymous file transfer protocol |
Answer» D. anonymous file transfer protocol |
75. |
Using FTP, a file can be copied from remote system to the local system using the command . |
A. | get |
B. | put |
C. | cd |
D. | lcd |
Answer» A. get |
76. |
Using FTP, a file can be copied from local host to remote host using the command . |
A. | get |
B. | put |
C. | cd |
D. | lcd |
Answer» B. put |
77. |
Using FTP, working directory on the remote host can be changed using the command . |
A. | pwd |
B. | put |
C. | cd |
D. | lcd |
Answer» C. cd |
78. |
Using FTP, working directory on the local host can be changed using the command . |
A. | pwd |
B. | bye |
C. | cd |
D. | lcd |
Answer» D. lcd |
79. |
Using FTP, list of files on the remote host can be viewed using the command . |
A. | pwd |
B. | bye |
C. | cd |
D. | lcd |
Answer» A. pwd |
80. |
Using FTP, a file on the remote host may be deleted using the command . |
A. | delete |
B. | bye |
C. | cd |
D. | lcd |
Answer» A. delete |
81. |
Using FTP, connection to remote FTP server may be terminated using the command . |
A. | delete |
B. | bye/ quit |
C. | cd |
D. | lcd |
Answer» B. bye/ quit |
82. |
Popular FTP clients are . |
A. | coreftp |
B. | fireftp |
C. | filezilla |
D. | all of them |
Answer» D. all of them |
83. |
Usually, telnet connection is established using command followed by name of host. |
A. | ftp |
B. | telnet |
C. | ping |
D. | ls |
Answer» B. telnet |
84. |
In networking, MAC stands for . |
A. | media address control |
B. | machine access control |
C. | media access contact |
D. | media access control |
Answer» D. media access control |
85. |
Logical address of a host connected to a network is otherwise called address. |
A. | ip address |
B. | ip version 4 address |
C. | ip version 6 address |
D. | all of them |
Answer» D. all of them |
86. |
The addresses of class A network has subnet mask of . |
A. | 255.0.0.0 |
B. | 255.255.0.0 |
C. | 255.255.255.0 |
D. | none of them |
Answer» A. 255.0.0.0 |
87. |
The addresses of class B network has subnet mask of . |
A. | 255.0.0.0 |
B. | 255.255.0.0 |
C. | 255.255.255.0 |
D. | none of them |
Answer» B. 255.255.0.0 |
88. |
The addresses of class C network has subnet mask of . |
A. | 255.0.0.0 |
B. | 255.255.0.0 |
C. | 255.255.255.0 |
D. | none of them |
Answer» C. 255.255.255.0 |
89. |
First byte of class A network is in the range of . |
A. | 1 - 126 |
B. | 128 – 191 |
C. | 192 - 223 |
D. | none of them |
Answer» A. 1 - 126 |
90. |
First byte of class B network is in the range of . |
A. | 1 - 126 |
B. | 128 – 191 |
C. | 192 - 223 |
D. | none of them |
Answer» B. 128 – 191 |
91. |
First byte of class C network is in the range of . |
A. | 1 - 126 |
B. | 128 – 191 |
C. | 192 - 223 |
D. | none of them |
Answer» C. 192 - 223 |
92. |
Each class A network supports hosts. |
A. | 1,67,77,214 |
B. | 65,534 |
C. | 254 |
D. | none of them |
Answer» A. 1,67,77,214 |
93. |
Each class B network supports hosts. |
A. | 1,67,77,214 |
B. | 65,534 |
C. | 254 |
D. | none of them |
Answer» B. 65,534 |
94. |
IPV4 has got_ bits for addressing of hosts. |
A. | 128 |
B. | 64 |
C. | 32 |
D. | 16 |
Answer» C. 32 |
95. |
IPV6 has got bits for addressing of hosts. |
A. | 128 |
B. | 64 |
C. | 32 |
D. | 16 |
Answer» A. 128 |
96. |
IPV4 has got bytes for addressing of hosts. |
A. | 16 |
B. | 8 |
C. | 4 |
D. | 2 |
Answer» C. 4 |
97. |
IPV6 has got bytes for addressing of hosts. |
A. | 16 |
B. | 8 |
C. | 4 |
D. | 2 |
Answer» A. 16 |
Done Reading?