Sunteți pe pagina 1din 35

Radio waves are limited to low

transmission capacities from 4,1bps to 6bps


1,1bps to 5bps 2,1bps to 8bps 3,1bps to 10bps 1
________.

The ________ connects nodes


over a network using a central 1,Cellular category 2,Meshodel 3,Star topology 4,Bus topology 3
control unit called the hub.
4,The first network
2,Networks can be called the ARPANET
divided into four was created by DOD
Which of the following 1,Networks enable sharing 3,Networks enable
network with the help of
statements is NOT true of information across centralization of data 2
topologies:esh, Advanced Research
regarding networks? theultiple computers. nagement.
cellular, star, and Projects Agency
bus. (ARPA).

Consider the following


statements:

Statement A: The resources and


software capabilities that are
2,Statement A is 3,Both, Statement A 4,Both, Statement A
shared by the nodes in a
1,Statement A is True and False and Statement and Statement B, are and Statement B, are
network are commonly known 3
Statement B is False. B is True. True. False.
as services.

Statement B: The common


services provided in a network
include file, print,essage,
application, and database
services.

Which of the following is true


with respect to the above
statements?
Consider the following
statements:

Statement A: Server is a
computer with high processing
power, which provides services
to the other computers in a
network. 2,Statement A is 3,Both, Statement A 4,Both, Statement A
1,Statement A is True and
False and Statement and Statement B, are and Statement B, are 1
Statement B is False.
Statement B: In a client-server B is True. True. False.
network setup, the server is not
responsible for processing the
requests sent by the clients.

Which of the following is true


with respect to the above
statements?
2,Advanced
1,Advanced Repeater 3,Advanced Research 4,Advanced Rear
ARPA stands for __________. Research Projects 3
Projects Agency Projects Agency Projects Agency
Administration
In case of fiber-optic cables,
which transmissionode is used
1,Multimode 2,Singleode 3,Infrared 4,Radio 2
for transmitting data over long
distances?
Infrared transmissions support
up to ________ at shorter 1,16bps 2,10bps 3,100bps 4,50bps 1
distances.
2,Coaxial cables
4,It can be
Which of the following 1,It uses copper wires, provide effective 3,It uses light rays
differentiated into the
statements is true for coaxial which are good conductors protection against instead of electricity to 2
two categories, single-
cables? of electricity. EMI during data transmit data.
mode andultimode.
transmissions.
Consider the following
statements:

Statement A: The bus topology


connects all the nodes on a
network to aain cable called bus.

Statement B: In the bus 2,Statement A is 3,Both, Statement A 4,Both, Statement A


1,Statement A is True and
topology, each packet that is False and statement and statement B, are and statement B, are 1
statement B is False.
placed on the bus contains the B is True. True. False.
address of the destination node
and is transmitted only in one
direction along the bus.

Which of the following is true


with respect to the above
statements?
Which of the following protocol
suites is used for
1,TCP/IP 2,IPX/SPX 3,DLC 4,AppleTalk 3
communication between
personal computers
andainframes (IBM Hosts)?
In the __________ transmission,
only one node can transmit data 1,Simplex 2,Half-duplex 3,Duplex 4,MAC 1
at a time.
Logical Link Control (LLC)
andedia Access Control (MAC)
1,Data Link layer 2,Network layer 3,Transport layer 4,Session layer 1
are two sublayers of
__________.
3,It performs error
1,It enables reliable 4,It enables the
2,It guarantees reporting and
Which of the following is true connection-oriented data exchange of
delivery of data datagram 3
about the Internet Protocol? transfers between the two electronicails (e-mails)
packets. fragmentation and
nodes. between two nodes.
reassembly.
Consider the following
statements:

Statement A: Telnet enables


remote login for users.
2,Both, statement A 3,Statement A is True 4,Statement A is False
Statement B: File Transfer 1,Both, statement A and and statement B, are and statement B is and statement B is
2
Protocol (FTP) allows transfer statement B, are False. True. False. True.
of files between local and m m m
remote hosts.

Which of the following is true


with respect to the above
statements?
Consider the following 1,Both, Statement A and 2,Both, Statement A 3,Statement A is True 4,Statement A is False
4
statements: statement B, are True. and statement B, are and statement B is and statement B is
False. False. True.
Statement A: The Application
layer converts the raw data bits
from the physical layer into
frames.

Statement B: The Data Link


layer converts the raw data bits
from the Physical layer into
frames.

Which of the following is true


with respect to the above
statements?
Which of the following layers
contains a number of protocols
4,Network Access
that provide services, such as e- 1,Application layer 2,Internet layer 3,Transport layer 1
layer
mails, Web browsing, and
remote login by users?
Which of the following is used
to identify the best path for
1,Routing 2,Packet switching 3,Multicasting 4,Multiplexing 1
sending data packets over a
network?
Earthen Wares Inc. had a
network of 200 computers.
1,Implement repeaters to 2,Implement a hub 3,Segment the network 4,Use a CSU/DSU to
Recently, the company has
strengthen the networking andanage the and use a bridge to connect computers of 3
undergone aajor expansion and
signal. network centrally. connect the segments. the network.
300 more employees have been
recruited. The network has now
expanded to 500 computers.
Network users are now
complaining of aajor slow down
in the network speed. What
should Timothy Burt, the
network administrator, do to
increase the speed of the
network?
2,Transforming data
4,Encoding and
1,Providing unique network bits from the 3,Providing the
The Network layer is decoding data in
addresses to each node Physical layer into interface between the 1
responsible for: autually agreeable
within the network groups called user and the network
format
frames
Consider the following
statements:

Statement A: The IEEE 802.1


LAN standard provides
information regarding the
prerequisites for the interface of
4,Statement A is False
LAN standards. 2,Both, statement A 3,Statement A is True
1,Both, statement A and and statement B is
and statement B, are and statement B is 3
statement B, are False. True.
Statement B: The IEEE 803.2 is True. False.
m
a part of the Logical Link
Control (LLC) sub-layer of the
Data Link layer.

Which of the following is true


with respect to the above
statements?
Diane Frye is a network
administrator at Supersoft2000.
She is giving a presentation on
SNA protocol suite to her
juniors. One of her juniors asks
her if there is a protocol in the
SNA suite that supports remote
1,DIA 2,SDLC 3,VTAM 4,APPN 2
connections through leased or
dialup connections and provides
point-to-point,ultipoint, half-
duplex, and full-duplex
transactions. Which protocol of
the SNA suite has these
features?
New Sky Infotec has a network
consisting of 800 computers.
Recently, the network traffic has
become increasingly slow. The
network administrator, John
Dalton, has decided to segment
1,Router 2,Gateway 3,Brouter 4,Bridge 1
the network into two parts with
400 computers in each segment.
Each network uses different
topologies. Which of the
following devices should he use
to connect these two networks?
Red Sky IT System has itsain
office in New York that has 200
1,X.25 2,ATM 3,SONET 4,SDH 1
computers. There are two
branch offices located in Detroit
and New Jersey consisting of
two computers each. The
organization wants to
implement a fast as well as cost
effective way ofaintaining
connectivity between all the
offices using digital lines.
Which of the following
technologies should the
organization implement toeet
the requirement?
Which of the following
component displays the 4,My Network Places
structure of the system 1,Windows Explorer 2,My Computer 3,Internet Explorer 1
directory?
m
Which of the following
permissions enables a user toake
4,Read
changes to subfolders, display
1,Change 2,Execute 3,Write 2
attributes and permissions, as
well as to run executable file
types?
You have purchased an
internalodem and installed it on
3,From the Control 4,From the
your Windows 2000 1,From the Control Panel, 2,Using the Display
Panel, using the Deviceanager, using
Professional computer. Even using the Add New properties in the 3
Add/Remove the Add New Hardware
though the vendor has told you, Hardware option. Control Panel.
hardware option. option.
that the device is plug and play,
Windows 2000 does not detect
it. How can you install the
driver for theodem provided by
the vendor?
m
Web pages can be loaded onto
the desktop and automatically 2,Active Channel 4,Mirroring
updated from the Web. This 1,Duplexing 3,Active Desktop 2
type of operation is referred to m m
as _________.
__________ stores deleted files
2,Recent folder 4,My Computer
and enables you to retrieve the
1,History folder 3,Recycle Bin 3
files when they are deleted
m m
byistake.
___________ are pieces of
retrievable information stored 2,History 4,NetHood
on the Web browser by the Web 1,Cookies 3,Favorites 1
server. m m
m
Files and folders can be
encrypted from the command 1,Mem 2,Cipher 3,Ver 4,Setver 2
line using the _____ command.
Which of the following
Windows 9x components is
used to hold information about
the system hardware that has
1,Registry 2,GDI 3,USER Files 4,Kernel 1
been identified by the
enumeration or detection
processes of the Plug-and-Play
system?
m
Jack, the System Administrator
of Global Infosystems, needs to
connect the offices of the
organization located across the
city. All the offices need to be
interconnected so that
2,He should install 3,He should install and 4,He should install and
information can be shared 1,He should install and
and configure Apple configure TCP/IP configure NetBEUI
among them. One of the office configure NWLink protocol 3
Talk protocol on all protocol on all protocol on all
works on Linuxachines while on all theachines.
theachines. theachines. theachines
the other offices run on
Windows environment or
Novell Netware environment.
Which of the following
protocols is suitable in such a
situation?
David Wong is a networking
intern at Certified Carriers. He
is studying the IPX/SPX
protocol suite as part of his
networking project. He is
looking for a protocol that 2,IPX 3,SPX
1,SAP 4,RIP 2
provides fast and connectionless m m
service. In addition, it should
also be able to provide routing
services. Which protocol would
best suit his requirements?
m
William, the network 1,DB-25 2,RJ-45 3,T-Connectors 4,DB-9 3
administrator at EarthenWare
Systems, needs to set up a LAN
of 15 computers based on the
bus topology using coaxial
cables. Determine the type of
connector that will be used to
connect the computers.
FernTech Inc. uses an ISDN line
to connect its offices located in
New York and Boston. George,
the network administrator of
2,The CSU unit is 3,The internal LAN
FernTech connects the router at 1,The router is defected 4,The atmosphere is
defected because of transmission is
the New York office to the line because of which the not clear because of
which the electro- defected because of
in order to establish the electro-magnetic which the electro- 2
magnetic which the electro-
connection between the two interferences have magnetic interferences
interferences have magnetic interferences
networks. However, after the increased. have increased.
increased. have increased.
company office shifts to the new
building, the network faces EMI
problems on the line. Predict the
possible cause for this problem.
2,Transforming data 4,Organizingessages
1,Providing unique network bits from the into segments or
The Data Link layer is 3,Controlling the
addresses to each node Physical layer into breaking large 2
responsible for: network traffic
within the network groups called segments into smaller
frames segments
Consider the following
2,Statement A is 3,Both, Statement A 4,Both, Statement A
statements: 1,Statement A is True and
False and Statement and Statement B, are and Statement B, are 4
Statement B is False.
B is True. True. False.
Statement A: In Duplex
transmission, either node can
transmit while the other node
can receive data.

Statement B: In half-duplex
transmission, both the nodes can
transmit as well as receive data
at the same time.

Which of the following is true


with respect to the above
statements?
Consider the following
statements:

Statement A: The IEEE 802.3


standard is used for 1-persistent
CSMA/CD (Carrier Senseultiple
Access/ Collision Detection)
LAN, which is commonly 4,Statement A is False
2,Both, statement A 3,Statement A is True
known as Ethernet. 1,Both, statement A and and statement B is
and statement B, are and statement B is 2
statement B, are False. True.
True. False.
Statement B: Using the CSMA
protocol, a node transmits data
packets whenever it finds the
channel or the transmissionedia
idle.

Which of the following is true,


with respect to the above
statements?
m
Red Infosystems is setting up a
network for 100 computers to
accommodate new recruits in its
production department.
Theanagement wants the
network to be efficient and has
instructed the network
administrator, Keith Turner, to
ensure this, while setting up the 1,255.255.255.240 2,255.255.192.0 3,255.255.256.0 4,255.255.224.0
1
network. In order to establish an
efficient network, Keith has
decided to subnet the network.
The network address allocated
for this network is 194.168.10.0.
Keith has decided to divide the
network into four subnets.
Determine the subnetask for this
network.
An internetwork is using the
TCP/IP protocol suite for
communication. This network is
used for downloadingusic 2,Network Access
1,Internet layer 3,Application layer 4,Transport layer 3
andovie files, which can be layer
viewed using onlineusic andovie
software. Determine the layer
on which this software will run.
Jim needs to create a TCP/IP 1,One for each subnet and 2,One for each 3,One for each subnet 4,One for each network 2
addressing scheme for his host ID subnet and WAN and each router adapter installed on
organization. Howany network connection interface each host and each
Ids heust allow while defining router interface
the subnetask for the network?
David is a network
administrator in SuperGraphics
Inc. The network in his
organization uses an address of
172.30.0.0/16. He will initially
need 25 subnets with 1000 hosts 1,255.255.240.0 2,255.255.248.0 3,255.255.252.0 4,255.255.254.0 3
in each subnet. Thereight be a
need for 55 subnets. Which
subnetask should David
configure toeet these
requirements?
Simon, the network
administrator at ITech Inc, has
3,Simon will need to
received complaints regarding
2,Simon will need use the TFTP service 4,Simon will need to
the slow rate of data transfer
to use the IPConfig to check the rate of use the tracert utility to
over the network. After 1,Simon will need to use the
utility with the data transfer and then check the path of the
checking the speed and flow of Ping utility with the /count
/renew option to apply the IPConfig router and apply the –h
data, Simon wants to check the option to check the hop 4
check the latest utility with the /renew option to check
route being used for data count and the path of data
information about option to check the theaximum number of
transfer and theaximum number transfer.
the path used by the count option to check hops in the path to the
of hops in the path to the
router. current number of destination host.
destination host. Which utility
hops used in the path.
will help him find out this
information?
Tim Hogan is the network 1,Tim needs to allocate 2,Tim needs to 3,Tim needs to assign 4,Tim needs to assign a 4
administrator for Red addresses statically. configure the a specific port number reserved IP address to
International Inc. He is setting TCP/IP default to theail server. theail server.
up a private network for the gateway.
organization and has set up the
DHCP server to allocate IP
addresses dynamically to the
hosts and theail server.
However, after a week of
installing the network, Tim
observes that the hosts are not
able to connect to theail server.
What is the possible cause for
this problem?
Tom Grant is the network
administrator at Global Systems
Inc. He needs to design the
network setup for his
organization.ore than 1650000 1,Class C 2,Class D 3,Class A 4,Class B 3
hosts will be connected in the
network. Which IP addressing
class would besteet his
requirement?
Shawn is downloading his
favorite jigsaw puzzle through
3,The file is
the Internet. The file is 1,The file is downloaded at 2,The file is
downloaded at the 4,The file is
downloaded as an HTML Web the Application layer and is downloaded and
Application layer and downloaded and saved 2
page. Assuming that the TCP/IP saved on the Transport saved at the
is saved on the at the Internet Layer.
protocol is used for performing layer. Application layer.
Presentation layer.
this task, which layer(s) is used
to download the file and save it
in the correct format on
Shawn’s computer?
Two subnets need to be created
for a Class C network
implemented in EarthenWares. 1,8190 2,64 3,62 4,8868 3
Determine the number of hosts
that can exist within a subnet.
Red Square Inc. is an upcoming
virtualusic store in North
America. The company has
increased its distribution
globally and provides the
facility to orderusic CDs over
the Internet. The Web site is
comprehensive and allows
visitors to listen tousic online. In
3,The subscribers will
order to promote their 2,The subscribers 4,The subscribers will
use the network
virtualusic store, the company 1,The subscribers will use will need aulticast need to use reserved IP
addresses of the other
frequently organizes concerts, their respective subnet IDs IP address provided addresses to 2
networks in order to
which can be seen live over the for teleconferencing. by the Class D IP teleconference over a
route data packets to
Internet. In order to view these addresses. secure network setup.
particular users.
concerts, the customers need to
subscribe to the Web site. Each
subscriber receives a login name
and password using which
he/she can log in, view, and
listen to the concert. The Web
siteaintains the subscribers as
user groups and uses streaming
audio/video to send data packets
toultiple computers. Determine
the IP addressing scheme that
will be used by these user
groups while viewing and
listening to the concert.
Research Infotech needs to set
up a small network for
performing its research and
development on the new
wireless technologies using the
Internet. The network needs to
be fast and efficient. In addition, 2,Proxy and cache
1,Newgroup servers 3,Catalog servers 4,News servers 2
the users should be able to use servers
the Internet only for accessing
relevant Web sites. Permissions
for accessing chat rooms should
not be allowed. Which type of
server can be used to implement
such a network setup?
Demi Chang is a network
administrator in AB
Corporation. She is using IIS to
provide Web services in the
organization. She needs to 1,WWW 2,FTP 3,SMTP 4,NNTP 3
configure IIS to send and
receiveails over the Internet.
Which IIS component should
she use to do this?
Which of the following is true 1,It stores a copy of data 2,It is used toake 3,It is used for user 4,It is used to store the 1
about airrored server? contained in another available the same authentication. repository of
servers. business transaction certificates.
toultiple users
across the Internet.
Robert Russel is a Web
administrator in Red Sky Inc.
He needs to install a Web server
in his organization. His primary
requirement is that the serverust
be platform independent and it 1,IIS Web server 2,Apache server 3,Personal Web server 4,FTP server 2
should enable its users to add
functionality to their
environments easily. Which
Web server besteets the
requirements?
Which of the following services
enable users to set up FTP sites
1,SMTP 2,NNTP 3,FTP 4,CGI 1
for uploading and downloading
files?
Consider the following
statements:

Statement A: WS-FTP is FTP


2,Statement A is
server software. 1,Statement A is True and 3,Both, statements A 4,Both, statements A
False and statement 1
statement B is False. and B, are True. and B, are False.
B is True.
Statement B:icrosoft Exchange
is FTP server software.

Which of the following is true


with respect to the above
statements?
BlueEye Inc. is aultinational
organization. The frequency and
size of files transferred between
the office and its clients is quite 4,Network News
1,Front Page Server 2,File Transfer
high, in the order of hundreds. 3,Mailing list services Transfer Protocol 2
Extensions Protocol (FTP)
Which of the following services (NNTP) service
should the organization use to
transferore files in lesser amount
of time?
2,It enables users to 4,It helps in
Which of the following in a 1,It is a service that controls 3,It is used to invoke
add functionality to subscribing the
correct explanation to httpd the Web server and the http Internet super daemon, 2
the existing source services of theailing
daemon? services. inetd.
code. list.
4,Enables users to log
1,Enables users to 2,Enables file in remotely to a server.
Which of the following is the communicate with other transfer 3,Enables users a set This service is used for
correct use of the TELNET users. This service needs to acrossachines, using of bulletin boards on allowing the clients to 4
service? be run foranaging the HTTP protocol. different subjects. log on to a remote
receipt/delivery ofails. m server.
m
Marilyn Jones is a Web
administrator in SmartLabs Inc.
Her company has an
internetwork. The company 1,Domain Name Servers 2,News servers 3,Media servers 4,Transaction servers 3
plans to keep streaming video
and audio content over this
internetwork. Which of the
following internetworking
servers would beost appropriate
in the current scenario?
1,This specifies the type of 4,This attribute is used
Which of the following is the 2,This stores the 3,This indicates that a
control that will be to specify the target
correct explanation of action value entered by the check box or a radio 4
displayed on the form to where the form data is
attribute? user in the control. button is selected.
accept user input. transmitted.
Consider the following
statements:

Statement A: HTTP defines


howessages are formatted and
transferred betweenultiple
clients.
Statement B: When a client 2,Statement A is
1,Statement A is True and 3,Both, statements A 4,Both, statements A
accesses the Web server, the False and statement 2
statement B is False. and B, are True. and B, are False.
HTTP gateway intercepts the B is True.
request and determines how to
connect to and communicate
with the Web server.

Which of the following is true


with respect to the above
statements?
Consider the following
statements: 2,Statement A is
1,Statement A is True and 3,Both, statements A 4,Both, statements A
False and statement 2
statement B is False. and B, are True. and B, are False.
Statement A: Input is an B is True.
attribute of FORM tag.
Statement B: Name is an
attribute of INPUT element.

Which of the following is true


with respect to the above
statements?
2,This attribute is 3,This specifies the
1,This attribute specifies the
used to specify the type of control that 4,This stores the value
Which of the following is the way in which the data can
target where the will be displayed on entered by the user in 1
true forethod attribute? be transmitted from the
form data is the form to accept user the control.
form to the Web server.
transmitted. input.
Consider the following
statements:

Statement A: Value button is a


valid HTML form control. 2,Statement A is
1,Statement A is True and 3,Both, statements A 4,Both, statements A
Statement B: Checkbox button False and statement 2
statement B is False. and B, are True. and B, are False.
is a valid HTML form control. B is True.

Which of the following is true


with respect to the above
statements?
1,Intrusion Detection 2,Intrusion 3,Intrusion Data 4,Intrusion Digital
What does IDS stand for? 2
Standard Detection System System Signature
4,Monitor the
3,Limit the number of
Which of the following is NOT 1,Remove or disable all connections to the
2,Allow remote persons who have
aeasure for securing a Web unused services from the server with the help of 2
administration. administrator or root-
server? server. IDS.
level access.
m
4,In a cryptosystem,
2,Asymmetric
3,Symmetric before data can be
1,Cryptosystems are of cryptosystems use
Which of the following is true cryptosystems use two exchanged between
three types: symmetric, the same key for 4
for cryptosystem? separate keys for two parties, the keyust
asymmetric, and RSA. both encrypting and
encryption. be shared between
decrypting data.
them.
Samuel is network administrator
in Bluesoft Inc. Lately, he is
getting complaints from the
network users that they are
repeatedly getting e-mailessages 1,Ping of death 2,SYN flood 3,Spamming 4,Mail bomb 4
that with huge files attached.
This is causing the users’ e-mail
box to crash. Which DoS attack
are they referring to?
Identify the firewall with the
following characteristics:
1. Filters packets at the Network
layer and examines packet
headers against an access
control list
2. Checks for all the
1,Statefulultilayer 2,Proxy server 3,Packet filter 4,Circuit-level
connectionsade to a local 1
inspection firewalls firewalls firewalls gateways
network
3. Allows only those
connections that are from a
trusted source and are
considered safe
4. Ensures that the users behind
the firewall have access to the
Internet
5. Ensures that the privacy of
the internal network isaintained
2,A technique used 3,A technique used
to passively redirect data that is
1,A technique used to 4,A technique used to
intercept and copy being exchanged
deliver an e-mailessage to send abnormally large
Sniffing is: all network traffic between two 2
someone whoight otherwise ping packets to a
on a system, a authorized entities to
not choose to receive it specific computer
server, a router, or a one orore unauthorized
firewall entities
1,Digital Encryption 2,Data Encryption 3,Data Encryption 4,Digital Encryption
What does DES stand for? 3
Standard System Standard System
_______ supportsinimum key
1,Triple (DES) 2,DES 3,Ron’s Code 4,AES 4
sizes of 128, 192, and 256 bits.
_________ is the process used
1,Cryptographicechanism 2,Cryptanalysis 3,Cryptology 4,Decryption 2
for breaking ciphers.
Consider the following
statements:

Statement A: Unauthorized
access to information can be
prevented byaking the contents 2,Statement A is
1,Statement A is True and 3,Both, statements A 4,Both, statements A
of theessages unreadable for all False and statement 3
statement B is False. and B, are True. and B, are False.
except by the intended recipient. B is True.

Statement B: The term


cryptosystems is used for
encryptionechanisms.
Which of the following is true
with respect to the above
statements?
Consider the following
statements:

Statement A: Smart card


provides tamper-proof
authentication and non-
repudiation.
2,Statement A is
1,Statement A is True and 3,Both, statements A 4,Both, statements A
Statement B: Authentication is False and statement 1
statement B is False. and B, are True. and B, are False.
the process of ensuring that B is True.
data, whether in transit or stored
on the network, is not tampered
with in any way.

Which of the following is true


with respect to the above
statements?
Which of the following
1,Certification Authority 3,Revoke Authority
components does NOT belong 2,PKI client 4,Digital certificates 3
(CA) (RA)
to the PKI framework?
Identify the process for TCP
connection that uses the
following steps: 2,Three-way 4,Multi-access
1,Broadcast storm 3,Spamming 2
1. The first node requests handshake handshake
communication by sending a
packet with the sequence
number and SYN bit.

2. The second node


acknowledges the receipt of the
data and responds with an
acknowledgement (ACK) that
contains the sequence number
plus one, and its own sequence
number back to the first node.

3. The first node responds and


the communication between the
two nodes proceeds.
Identify the type of DoS attack
that takes place in the
followinganner:
1. An intruder sends an
excessive number of faked
broadcast packets to all the
computers in a network.

2. Each computer forwards 1,Sniffing 2,SYN flood 3,Spoofing 4,Broadcast storm 4


these packets to the specified
fake target address, increasing
the amount of network traffic
excessively.

3. These packets remain on the


network,oving from one
computer to another, until they
completely choke the network.

4. The high increase in the


network traffic prevents the
attacked computer from
processing packets containing
real data.
Identify the networking
technology:
When an external entity
accesses an internal network
resource, the external IP address
isapped to a fixed IP address. 1,Secure Socket Layer 2,Socket Server 3,Transport Layer 4,Network Address
4
When an internal node accesses (SSL) (SOCKS) Security (TLS) Translation (NAT)
an external resource, it’s
deviceaps a private IP address to
the first IP address that is
available from a pool of
globally unique IP addresses.
Which of the following is the
1,Computer Aided Software 2,Computer Aided 3,Computer Aided 4,Computer Aided
correct expansion of the term 1
Engineering System Engineering Software Enterprise System Enterprise
CASE?
_______ is the high speed
network hat exists separately
from the LAN andain corporate
1,SAN 2,NAS 3,DAS 4,MAN 1
network and allows different
kinds of storage devices to be
shared.
________ is the first activity of 1,Implementation 2,Testing 3,Analysis 4,Design 3
the Development phase.
________ is the last activity of
1,Design 2,Construction 3,Testing 4,Implementation 4
the Development phase.
___________ can be used to
connect network segments and
to selectively determine the 1,Bridges 2,Repeaters 3,Protocol 4,Hubs 1
appropriate segment to which it
should pass the signal.
Which of the following
communicationedia is the cost-
effective solution for users 2,Very Small
1,ISDN Integrated Services 4,Digital Subscriber
seeking an independent Aperture Terminals 3,Wireless 2
Digital Network (ISDN) Line (DSL)
communications network and (VSAT)
connects a large number of
geographically dispersed sites?
In which of the following
technologies, computers provide
a powerful and efficient way to
store, retrieve, analyze, or 1,E-learning 2,Bioinformatics 3,Embedded system 4,IP telephony 2
predict biological data in the
form of text, trees,aps, and
pathways?
Consider the following
statements:
2,Statement A is
1,Statement A is True and 3,Both, statements A 4,Both, statements A
Statement A: System design, False and statement 4
statement B is False. and B, are True. and B, are False.
also called top-level design, B is True.
specifies the internal logic of
each of theodules specified in
system design.
Statement B: Detailed design,
also called low-level design,
aims to identify theodules that
should be in the system, the
specification of theseodules, and
how they interact with each
other.

Which of the following options


is true with respect to the above
statements?

Consider the following


statements:

Statement A: Fibre optic cables


areore efficient then coaxial and
twisted pair cables.
Statement B: Routers are used
2,Statement A is
to expand the existing network 1,Statement A is True and 3,Both, statements A 4,Both, statements A
False and statement 1
and amplify the signal as itoves statement B is False. and B, are True. and B, are False.
B is True.
from one device to another.

Which of the following options


is true with respect to the above
statements?

m
Radio waves andicrowaves are 1,IP Telephony 2,Voice over IP 3,Wireless 4,Enterprise 3
used in which of the following
communications?
Which of the following
technologies covers e-mail/Web
1,Embedded system 2,Biometrics 3,Content security 4,Firewall 3
scanning andaliciousobile code
(MMC)anagement?
Which of the following is NOT 1,Products arearketed 3,Products will be 4,Products sold at
2,Payment is online 4
the feature of eShop? usingedia delivered at home higher prices
The NTFS structure uses 64-bit
entries to keep track of the
storage on the disk. The core
component of the NTFS system
1,Volume file 2,Log file 3,Master File Table 4,Quota Table 3
is the __________ that contains
information about each file
being stored on the disk.
m
Which file system supports
encryption of files and enables 4,NTFS
administrators to set up a 1,CDFS 2,FAT32 3,FAT16 4
limited amount of hard drive m
space to each user?
During the Windows 9x startup
process, which is the file that
4,WIN.COM
tracks the components and 2,EMM386.EXE
1,BOOTLOG.TXT 3,SYSTEM.DA0 1
drivers of Windows 9x that are m
m
successfully loaded and
initialized?
John wants to perform 1,BAT 2,UDF 3,EXE 4,SYS 2
unattended installation of m
Windows 2000 using answer
files on 50achines over the
network. He wants to specify
unique settings for different
computers on the network.
Which type of file needs to be
created for this purpose?
m
The ______ option of Startenu
4,Documents
is used to start programs or open
1,Settings 2,Run 3,Find 2
folders from a command-line
m
dialog box.
The __________ option is used
4,Startenu
to display all applications that 2,My Network
1,My Computer 3,Taskbar 3
are currently open. Places
m
m
The network for a department of
ABC Corp. needs to be set up.
This network should be set up
using a cablingedium that will
2,Fiber Optic
ensure secure data transmission. 4,STP Cabling should
Cabling should be
In addition, the cablingedium 1,Coaxial Cabling should be 3,UTP Cabling should be used
used 2
should offer signaling rates in used be used
excess of 200,000bps. Which of m
m
the following cablingedium
could be used in the given
situation?
Which of the following are the
two Registry editors included in
Windows 2000 and Windows 2,RegEdit and 4,RegEdit and
XP that enable you to perform SysEdit RegEdt32
1,RegEdit and PolEdit 3,RegEdit and GPE 4
basic functions such as adding,
editing, and removing Registry m m
entries?
m
There are four important
Windows utilities that can be
used to optimize andaintain the
operation of the hard disk drive.
All of these utilities, except one, 2,DEFRAG 4,CHKDSK
has been available in the initial 1,BACKUP 3,SCANDISK 3
versions ofS-DOS. Which of the m m
following is the utility that has
not been available in the initial
versions ofS-DOS?
m
____________ is the
complimentary searchable 2,Microsoft
4,Download Center
database of information and Knowledge Base
1,Online Support Requests 3,Facts by Product 2
self-help tools used byicrosoft
m
Technical Support to support m
their customers?
Which of the following
2,Star Topology 4,Mesh Design
topologies offers theost basic
1,Ring Topology 3,Bus Topology 4
network connection scheme,
where each node has a direct
physical connection with all the
other nodes of the network?
________ is a plastic or glass
cable designed to carry voice or
digital data in the form of light
4,Wireless radio
pulses. In this type of cable, the 2,Copper cable
frequency signals
signals are introduced into the 1,Fiber-optic cable 3,Infrared light 1
cable by a laser diode and
bounced along its interior until
they reach the end of the cable.
m
IP addresses exist in the
numeric format of
XXX.YYY.ZZZ.AAA. This
format of specifying addresses 2,2-bit fields 4,6-bit fields
is referred to as the dotted 1,4-bit fields 3,8-bit fields 3
decimal notation. Each address
consists of four ______
separated by dots (.).
m
In Windows 2000, you can have
computer names that are 63
characters long. These names 2,NetBIOS
can include letters A through Z, Enhanced User 4,IPX/SPX Protocol
1,Dynamic Host
numbers 0 through 9, and Interface Protocol 3,TCP/IP Protocol 3
Configuration Protocol
hyphens. Which of the m
following protocols supports m
this type of naming convention?
m
Which of the following device
receives, amplifies, and
retransmitsessages to keep them
1,Hub 2,Bridge 3,Router 4,Gateway 3
from deteriorating as they are
transmitted?
m
Which of the following devices
is used to link networks 2,Bridge 4,Gateway
together, so that nodes within 1, Hub 3,Router 1
them can communicate with m m
each other?
Which of the following
technologies provides high-
speed communication links by
2,Digital Subscriber 4,Satellite Internet
using the existing telephone 1,ISDN Connection 3,Dialup Networking 2
Lines Access
lines to generate bandwidths
ranging up to 9Mb/s orore?
m
Consider the following
statements:

Statement A: In a peer-to-peer 4,Statement A is False


network, each computer is 2,Both, Statement A 3,Statement A is True and Statement B is
1,Both, Statement A and
attached to the network in a ring and Statement B, and Statement B is True. 2
Statement B, are False.
or bus fashion and is equal to are True. False.
the other units on the network. m

Statement B: In a client/server
network, dependent
workstations, referred to as
clients, operate in conjunction
with a dedicatedaster computer.

Which of the following option is


true with respect to the above
statements?
You want to enable several
computers to connect to the
Internet through a single dial-up
connection. You set up a
2,Use Network and
computer running Windows
Dial-Up 4,Use Network option
2000 to connect to the Internet 1,Use Network and Dial-Up 3,Use Network option
Connections option under Control Panel.
using the dial-up connection. Connections option under under Settings. 1
under Control
Other computers will connect to Settings. m
Panel. m
this computer to access the
m
Internet. Which of the following
settings will you apply to
accomplish the task?
m
SoftPro Pvt. Ltd. has set up a
new office. As a part of the
2,They should use 4,They should combine
process for implementing
the Digital various certificates
security, they want to restrict 3,They should set up
1,They should use the certificates to with security standards
access to the internal network so the firewall program to
Kerberos to protect their protect their such as the IP Security 3
that specific types of items or protect their company
company network company network Protocol
addresses are not allowed to network.
pass between the networks.
m m
Which of the following
securityeasures should be taken
to control the traffic between the
networks?
m
You have recently connected
computers in your organization
to form a network. You need to
install a protocol that will
ensure security of data in your 2,NWLink 4,TCP/IP
network. Also, you need to 1,NetBEUI 3,Apple talk 4
ensure that data is delivered to m m
the receiver correctly. Which of
the following protocols will you
use?
m
A newly set up office of Softpro
need to be interconnected with
the existing one so that
information could be shared
2,Apple Talk
among them. The newly set up 3,TCP/IP protocol 4,NetBEUI protocol
1,NWLink protocol should protocol should be
office works on Linuxachines should be installed and should be installed and 3
be installed and configured installed and
while the existing one runs on configured configured
configured
Windows environment. Which
of the following protocols is
suitable for theachines in such a
situation?

S-ar putea să vă placă și