set-5

201. What is the main difference between TCP and UDP in terms of reliability?

  1. TCP is more reliable than UDP.

  2. UDP is more reliable than TCP.

  3. TCP and UDP have the same level of reliability.

  4. None of these

Show me the answer

Answer: 1. TCP is more reliable than UDP.

Explanation:

  • TCP provides reliable, connection-oriented communication with error checking and retransmission of lost packets.

  • UDP is connectionless and does not guarantee reliable delivery.

202. What is the main difference between TCP and UDP in terms of overhead?

  1. TCP has less overhead than UDP.

  2. UDP has less overhead than TCP.

  3. TCP and UDP have the same level of overhead.

  4. None of these

Show me the answer

Answer: 2. UDP has less overhead than TCP.

Explanation:

  • TCP has higher overhead due to features like connection establishment, error checking, and flow control.

  • UDP has minimal overhead, making it faster but less reliable.

203. What is the main difference between TCP and UDP in terms of error detection and correction?

  1. TCP provides error detection and correction, while UDP does not.

  2. UDP provides error detection and correction, while TCP does not.

  3. TCP and UDP provide the same level of error detection and correction.

  4. None of these

Show me the answer

Answer: 1. TCP provides error detection and correction, while UDP does not.

Explanation:

  • TCP includes mechanisms for error detection and correction, such as checksums and retransmission of lost packets.

  • UDP does not provide error correction, making it faster but less reliable.

204. What is the main purpose of HTTP in the Application layer?

  1. To provide secure data transmission between end systems.

  2. To provide reliable data transmission between end systems.

  3. To transmit data in a standardized format between clients and servers.

  4. None of these

Show me the answer

Answer: 3. To transmit data in a standardized format between clients and servers.

Explanation:

  • HTTP (Hypertext Transfer Protocol) is used for transmitting web pages and other data between clients (browsers) and servers.

205. What is the main difference between HTTP and HTTPS?

  1. HTTPS is a more secure version of HTTP.

  2. HTTP is a more secure version of HTTPS.

  3. HTTPS and HTTP have the same level of security.

  4. None of these

Show me the answer

Answer: 1. HTTPS is a more secure version of HTTP.

Explanation:

  • HTTPS (Hypertext Transfer Protocol Secure) uses SSL/TLS encryption to secure data transmission, while HTTP does not provide encryption.

206. What is the main purpose of SSL (Secure Sockets Layer) in HTTPS?

  1. To provide encryption for data transmission.

  2. To provide authentication for data transmission.

  3. To provide both encryption and authentication for data transmission.

  4. None of these

Show me the answer

Answer: 3. To provide both encryption and authentication for data transmission.

Explanation:

  • SSL (Secure Sockets Layer) encrypts data to ensure confidentiality and authenticates the server to ensure the integrity of the communication.

207. What is the main purpose of TLS (Transport Layer Security) in HTTPS?

  1. To provide encryption for data transmission.

  2. To provide authentication for data transmission.

  3. To provide both encryption and authentication for data transmission.

  4. None of these

Show me the answer

Answer: 3. To provide both encryption and authentication for data transmission.

Explanation:

  • TLS (Transport Layer Security) is the successor to SSL and provides encryption and authentication for secure communication.

208. What is the main purpose of FTP (File Transfer Protocol)?

  1. To transfer files between clients and servers over the internet.

  2. To transfer files between servers over the internet.

  3. To transfer files within a single server.

  4. None of these

Show me the answer

Answer: 1. To transfer files between clients and servers over the internet.

Explanation:

  • FTP is used for uploading and downloading files between a client and a server over a network.

209. What is PuTTY used for in file transfer?

  1. A File Transfer client.

  2. A File Transfer server.

  3. An SSH (Secure Shell) client.

  4. None of these

Show me the answer

Answer: 3. An SSH (Secure Shell) client.

Explanation:

  • PuTTY is primarily used as an SSH client for secure remote access to servers, but it can also support file transfer using SCP or SFTP.

210. What is WinSCP used for in file transfer?

  1. A File Transfer client.

  2. A File Transfer server.

  3. An SCP (Secure Copy) client.

  4. None of these

Show me the answer

Answer: 1. A File Transfer client.

Explanation:

  • WinSCP is a graphical SFTP and SCP client used for secure file transfer between a local machine and a remote server.

211. What is the main difference between FTP and SFTP in terms of security?

  1. FTP is more secure than SFTP.

  2. SFTP is more secure than FTP.

  3. FTP and SFTP have the same level of security.

  4. None of these

Show me the answer

Answer: 2. SFTP is more secure than FTP.

Explanation:

  • FTP transmits data in plaintext, making it vulnerable to interception.

  • SFTP (Secure File Transfer Protocol) encrypts data, providing a secure alternative to FTP.

212. What is the main purpose of MRTG (Multi Router Traffic Grapher)?

  1. To monitor network traffic and generate graphical representations of network usage.

  2. To monitor server performance and generate graphical representations of resource usage.

  3. To monitor website traffic and generate graphical representations of website usage.

  4. None of these

Show me the answer

Answer: 1. To monitor network traffic and generate graphical representations of network usage.

Explanation:

  • MRTG is a tool used to monitor network traffic and generate graphs showing bandwidth usage over time.

213. What is the main purpose of PRTG (Paessler Router Traffic Grapher)?

  1. To monitor network traffic and generate graphical representations of network usage.

  2. To monitor server performance and generate graphical representations of resource usage.

  3. To monitor website traffic and generate graphical representations of website usage.

  4. None of these

Show me the answer

Answer: 1. To monitor network traffic and generate graphical representations of network usage.

Explanation:

  • PRTG is a network monitoring tool that provides real-time data on network traffic, bandwidth usage, and device performance.

214. What is the main purpose of SNMP (Simple Network Management Protocol)?

  1. To monitor network traffic and generate graphical representations of network usage.

  2. To monitor server performance and generate graphical representations of resource usage.

  3. To monitor and manage network devices and generate alerts for network events.

  4. None of these

Show me the answer

Answer: 3. To monitor and manage network devices and generate alerts for network events.

Explanation:

  • SNMP is used to monitor and manage network devices, collect performance data, and generate alerts for network issues.

215. What is the main purpose of Packet Tracer?

  1. To monitor network traffic and generate graphical representations of network usage.

  2. To monitor server performance and generate graphical representations of resource usage.

  3. To simulate and test network configurations and protocols.

  4. None of these

Show me the answer

Answer: 3. To simulate and test network configurations and protocols.

Explanation:

  • Packet Tracer is a network simulation tool used to design, configure, and troubleshoot network topologies.

216. What is the main purpose of Wireshark?

  1. To monitor network traffic and generate graphical representations of network usage.

  2. To monitor server performance and generate graphical representations of resource usage.

  3. To analyze and troubleshoot network traffic.

  4. None of these

Show me the answer

Answer: 3. To analyze and troubleshoot network traffic.

Explanation:

  • Wireshark is a packet analyzer used to capture and inspect network traffic in real-time, helping to diagnose network issues.

217. What is the main purpose of socket programming?

  1. To provide a standardized way for applications to communicate over a network.

  2. To provide a secure way for applications to communicate over a network.

  3. To provide a fast way for applications to communicate over a network.

  4. None of these

Show me the answer

Answer: 1. To provide a standardized way for applications to communicate over a network.

Explanation:

  • Socket programming enables applications to establish communication channels over a network using sockets, which are endpoints for sending and receiving data.

218. What is the main difference between a TCP (Transmission Control Protocol) socket and a UDP (User Datagram Protocol) socket?

  1. TCP sockets provide reliable and ordered data transmission, while UDP sockets provide unreliable and unordered data transmission.

  2. UDP sockets provide reliable and ordered data transmission, while TCP sockets provide unreliable and unordered data transmission.

  3. TCP sockets provide encrypted data transmission, while UDP sockets provide unencrypted data transmission.

  4. None of these

Show me the answer

Answer: 1. TCP sockets provide reliable and ordered data transmission, while UDP sockets provide unreliable and unordered data transmission.

Explanation:

  • TCP ensures reliable, ordered, and error-checked delivery of data.

  • UDP is faster but does not guarantee reliability or order.

219. What is the main purpose of the bind() function in socket programming?

  1. To associate a socket with a specific network address.

  2. To associate a socket with a specific network port.

  3. To associate a socket with a specific network address and port.

  4. None of these

Show me the answer

Answer: 3. To associate a socket with a specific network address and port.

Explanation:

  • The bind() function assigns a specific IP address and port number to a socket, enabling it to listen for incoming connections.

220. What is the main purpose of the listen() function in socket programming?

  1. To allow a socket to receive incoming connections.

  2. To establish a connection with a remote socket.

  3. To send data to a remote socket.

  4. None of these

Show me the answer

Answer: 1. To allow a socket to receive incoming connections.

Explanation:

  • The listen() function prepares a socket to accept incoming connection requests from clients.

221. What is the main purpose of the accept() function in socket programming?

  1. To allow a socket to receive incoming connections.

  2. To establish a connection with a remote socket.

  3. To accept an incoming connection from a remote socket.

  4. None of these

Show me the answer

Answer: 3. To accept an incoming connection from a remote socket.

Explanation:

  • The accept() function accepts an incoming connection request and creates a new socket for communication with the client.

222. What is the main purpose of computer security?

  1. To protect computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction.

  2. To enhance computer performance.

  3. To store data.

  4. None of these

Show me the answer

Answer: 1. To protect computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction.

Explanation:

  • Computer security aims to safeguard systems and data from threats such as hacking, malware, and data breaches.

223. What is the main type of security attack?

  1. Malware attack

  2. Man-in-the-middle attack

  3. Denial of Service attack

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Security attacks include malware (e.g., viruses, ransomware), man-in-the-middle attacks (e.g., eavesdropping), and Denial of Service (DoS) attacks (e.g., overwhelming a server).

224. What is the main principle of cryptography?

  1. Confidentiality

  2. Integrity

  3. Availability

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Cryptography ensures confidentiality (data is private), integrity (data is unaltered), and availability (data is accessible when needed).

225. What is the main purpose of the RSA algorithm?

  1. To provide confidentiality

  2. To provide integrity

  3. To provide digital signatures

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • The RSA algorithm is used for encryption (confidentiality), digital signatures (integrity and authentication), and secure key exchange.

226. What is the main purpose of digital signatures?

  1. To provide confidentiality

  2. To provide integrity

  3. To provide authentication

  4. All of the above

Show me the answer

Answer: 3. To provide authentication

Explanation:

  • Digital signatures verify the authenticity of a message or document, ensuring it was sent by the claimed sender and has not been tampered with.

227. What is the main purpose of securing e-mail (PGP)?

  1. To provide confidentiality

  2. To provide integrity

  3. To provide authentication

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • PGP (Pretty Good Privacy) encrypts emails for confidentiality, ensures data integrity, and verifies sender authenticity.

228. What is a malware attack?

  1. An attack that involves the use of malicious software to compromise computer systems and networks.

  2. An attack that involves intercepting communication between two systems to steal sensitive information or alter the communication.

  3. An attack that involves overwhelming a computer system or network with traffic, making it unavailable to users.

  4. None of these

Show me the answer

Answer: 1. An attack that involves the use of malicious software to compromise computer systems and networks.

Explanation:

  • Malware attacks include viruses, worms, ransomware, and spyware designed to disrupt, damage, or gain unauthorized access to systems.

229. What is a man-in-the-middle attack?

  1. An attack that involves the use of malicious software to compromise computer systems and networks.

  2. An attack that involves intercepting communication between two systems to steal sensitive information or alter the communication.

  3. An attack that involves overwhelming a computer system or network with traffic, making it unavailable to users.

  4. None of these

Show me the answer

Answer: 2. An attack that involves intercepting communication between two systems to steal sensitive information or alter the communication.

Explanation:

  • In a man-in-the-middle attack, an attacker secretly intercepts and possibly alters communication between two parties.

230. What is a denial of service attack?

  1. An attack that involves the use of malicious software to compromise computer systems and networks.

  2. An attack that involves intercepting communication between two systems to steal sensitive information or alter the communication.

  3. An attack that involves overwhelming a computer system or network with traffic, making it unavailable to users.

  4. None of these

Show me the answer

Answer: 3. An attack that involves overwhelming a computer system or network with traffic, making it unavailable to users.

Explanation:

  • A Denial of Service (DoS) attack floods a system with excessive traffic, rendering it unable to respond to legitimate requests.

231. What is a phishing attack?

  1. An attack that involves tricking a user into revealing sensitive information, such as login credentials or financial information.

  2. An attack that involves the use of malicious software to compromise computer systems and networks.

  3. An attack that involves intercepting communication between two systems to steal sensitive information or alter the communication.

  4. An attack that involves overwhelming a computer system or network with traffic, making it unavailable to users.

Show me the answer

Answer: 1. An attack that involves tricking a user into revealing sensitive information, such as login credentials or financial information.

Explanation:

  • Phishing attacks use deceptive emails or websites to trick users into providing sensitive information.

232. What is the main purpose of cryptography?

  1. To provide confidentiality

  2. To provide integrity

  3. To provide availability

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Cryptography ensures confidentiality (data is private), integrity (data is unaltered), and availability (data is accessible when needed).

233. What is the main type of encryption used in cryptography?

  1. Symmetric encryption

  2. Asymmetric encryption

  3. Hash encryption

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Cryptography uses symmetric encryption (single key), asymmetric encryption (public/private keys), and hash functions (one-way encryption).

234. What is the main advantage of symmetric encryption over asymmetric encryption?

  1. Symmetric encryption is faster than asymmetric encryption.

  2. Symmetric encryption is more secure than asymmetric encryption.

  3. Asymmetric encryption is faster than symmetric encryption.

  4. Asymmetric encryption is more secure than symmetric encryption.

Show me the answer

Answer: 1. Symmetric encryption is faster than asymmetric encryption.

Explanation:

  • Symmetric encryption uses a single key for both encryption and decryption, making it faster but less secure for key distribution compared to asymmetric encryption.

235. What is the main purpose of a hash function in cryptography?

  1. To provide confidentiality

  2. To provide integrity

  3. To provide availability

  4. None of these

Show me the answer

Answer: 2. To provide integrity

Explanation:

  • Hash functions generate fixed-size outputs (hashes) from input data, ensuring data integrity by detecting any changes to the original data.

236. What is the main advantage of digital signatures over traditional signatures?

  1. Digital signatures are faster than traditional signatures.

  2. Digital signatures are more secure than traditional signatures.

  3. Traditional signatures are faster than digital signatures.

  4. Traditional signatures are more secure than digital signatures.

Show me the answer

Answer: 2. Digital signatures are more secure than traditional signatures.

Explanation:

  • Digital signatures use cryptographic techniques to ensure authenticity, integrity, and non-repudiation, making them more secure than traditional signatures.

237. What is the RSA algorithm?

  1. A symmetric encryption algorithm

  2. An asymmetric encryption algorithm

  3. A hash encryption algorithm

  4. None of these

Show me the answer

Answer: 2. An asymmetric encryption algorithm

Explanation:

  • RSA is an asymmetric encryption algorithm that uses a pair of keys (public and private) for encryption and decryption.

238. What is the main purpose of the RSA algorithm?

  1. To provide confidentiality

  2. To provide integrity

  3. To provide availability

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • RSA is used for encryption (confidentiality), digital signatures (integrity and authentication), and secure key exchange.

239. What is the main advantage of the RSA algorithm over symmetric encryption algorithms?

  1. The RSA algorithm is faster than symmetric encryption algorithms.

  2. The RSA algorithm is more secure than symmetric encryption algorithms.

  3. Symmetric encryption algorithms are faster than the RSA algorithm.

  4. Symmetric encryption algorithms are more secure than the RSA algorithm.

Show me the answer

Answer: 3. Symmetric encryption algorithms are faster than the RSA algorithm.

Explanation:

  • Symmetric encryption is faster than RSA because it uses a single key for both encryption and decryption, whereas RSA uses complex mathematical operations.

240. What is the main disadvantage of the RSA algorithm?

  1. The RSA algorithm is slower than symmetric encryption algorithms.

  2. The RSA algorithm is less secure than symmetric encryption algorithms.

  3. Symmetric encryption algorithms are faster than the RSA algorithm.

  4. Symmetric encryption algorithms are more secure than the RSA algorithm.

Show me the answer

Answer: 1. The RSA algorithm is slower than symmetric encryption algorithms.

Explanation:

  • RSA is slower due to its reliance on complex mathematical operations, making it less efficient for large-scale data encryption compared to symmetric encryption.

241. What is the key length used in the RSA algorithm?

  1. 128-bit key length

  2. 256-bit key length

  3. 512-bit key length

  4. 1024-bit key length

Show me the answer

Answer: 4. 1024-bit key length

Explanation:

  • RSA typically uses key lengths of 1024 bits or higher for secure encryption.

242. What is a firewall?

  1. A physical barrier that protects a network.

  2. A software application that protects a network.

  3. A hardware device that protects a network.

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Firewalls can be implemented as hardware devices, software applications, or a combination of both to protect networks from unauthorized access.

243. What is the main purpose of a firewall?

  1. To provide confidentiality

  2. To provide integrity

  3. To provide availability

  4. To provide security

Show me the answer

Answer: 4. To provide security

Explanation:

  • Firewalls monitor and control incoming and outgoing network traffic based on predefined security rules, protecting the network from threats.

244. What is the main type of firewall used in networks?

  1. Packet filtering firewall

  2. Circuit-level firewall

  3. Application-level firewall

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Firewalls can be packet-filtering (examines packets), circuit-level (monitors connections), or application-level (inspects application-layer data).

245. What is the main advantage of a firewall over other security measures?

  1. Firewalls are faster than other security measures.

  2. Firewalls are more secure than other security measures.

  3. Other security measures are faster than firewalls.

  4. Other security measures are more secure than firewalls.

Show me the answer

Answer: 2. Firewalls are more secure than other security measures.

Explanation:

  • Firewalls provide a strong first line of defense by filtering traffic and blocking unauthorized access, making them a critical security measure.

246. What is the main disadvantage of a firewall?

  1. Firewalls are too slow to be effective.

  2. Firewalls are too complex to be used effectively.

  3. Firewalls can cause network performance issues.

  4. Firewalls can be bypassed by attackers.

Show me the answer

Answer: 3. Firewalls can cause network performance issues.

Explanation:

  • Firewalls can introduce latency and reduce network performance due to the processing required to inspect and filter traffic.

247. What is SSL?

  1. A symmetric encryption algorithm

  2. An asymmetric encryption algorithm

  3. A secure communication protocol

  4. None of these

Show me the answer

Answer: 3. A secure communication protocol

Explanation:

  • SSL (Secure Sockets Layer) is a protocol used to establish encrypted links between a web server and a browser, ensuring secure communication.

248. What is the main purpose of SSL?

  1. To provide confidentiality

  2. To provide integrity

  3. To provide availability

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • SSL provides confidentiality (encryption), integrity (data is unaltered), and availability (secure communication is always accessible).

249. What type of encryption does SSL use?

  1. Symmetric encryption

  2. Asymmetric encryption

  3. Hash encryption

  4. None of these

Show me the answer

Answer: 2. Asymmetric encryption

Explanation:

  • SSL uses asymmetric encryption (public/private keys) for secure key exchange and symmetric encryption for data transmission.

250. What is the main advantage of SSL over other secure communication protocols?

  1. SSL is faster than other secure communication protocols.

  2. SSL is more secure than other secure communication protocols.

  3. Other secure communication protocols are faster than SSL.

  4. Other secure communication protocols are more secure than SSL.

Show me the answer

Answer: 2. SSL is more secure than other secure communication protocols.

Explanation:

  • SSL provides strong encryption and authentication, making it a widely trusted protocol for secure communication.

Last updated