set-2

51. Which of the following networking devices is used to connect two different networks?

  1. Hub

  2. Switch

  3. Router

  4. All of the above

Show me the answer

Answer: 3. Router

Explanation:

  • A router is used to connect two different networks and route data between them.

52. An ______ is a network security tool that monitors network traffic for suspicious activity and issues alerts when such activity is discovered.

  1. Intrusion Detection System (IDS)

  2. Intrusion Prevention System (IPS)

  3. Both of the above

  4. None of these

Show me the answer

Answer: 1. Intrusion Detection System (IDS)

Explanation:

  • An IDS monitors network traffic for suspicious activity and issues alerts but does not take action to block the activity.

53. In computer networking, which protocol is used to map IP network address to hardware MAC address?

  1. SNMP

  2. ARP

  3. TCP/IP

  4. PPP

Show me the answer

Answer: 2. ARP

Explanation:

  • ARP (Address Resolution Protocol) is used to map an IP address to a MAC address.

54. In OSI reference model, which layer is responsible for error-free, end-to-end (process-to-process) delivery of data from source host to destination host?

  1. Network layer

  2. Transport layer

  3. Presentation layer

  4. Application layer

Show me the answer

Answer: 2. Transport layer

Explanation:

  • The Transport layer ensures error-free, end-to-end delivery of data between processes on different hosts.

55. The X.25 standard specifies

  1. DTE/DCE interface

  2. Start – stop data

  3. Data bit rate

  4. Dial up access

Show me the answer

Answer: 1. DTE/DCE interface

Explanation:

  • X.25 is a protocol suite that specifies the interface between Data Terminal Equipment (DTE) and Data Circuit-terminating Equipment (DCE).

56. Which one of the following network devices uses the higher number of layers in the OSI Model?

  1. Switch

  2. Router

  3. Bridge

  4. All use the same number of layers

Show me the answer

Answer: 2. Router

Explanation:

  • Routers operate at the Network layer (Layer 3) of the OSI model, while switches and bridges operate at the Data Link layer (Layer 2).

57. Firewall which is designed to monitor and filter incoming and outgoing network traffic based on an organization’s previously established security policies is implemented in

  1. Hardware

  2. Software

  3. Combination of hardware and software

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Firewalls can be implemented in hardware, software, or a combination of both.

58. In information security, asymmetric cryptography uses______.

  1. Public and private keys for encryption and decryption

  2. Same key for both encryption and decryption

  3. Both of the above

  4. None of these

Show me the answer

Answer: 1. Public and private keys for encryption and decryption

Explanation:

  • Asymmetric cryptography uses a pair of keys: a public key for encryption and a private key for decryption.

  1. Frame

  2. Datagram

  3. Message

  4. Segment

Show me the answer

Answer: 1. Frame

Explanation:

  • The Protocol Data Unit (PDU) of the Data Link layer is called a frame.

60. Protocol Data Unit (PDU) of transport layer is known as

  1. Frame

  2. Datagram

  3. Segment

  4. Both B and C

Show me the answer

Answer: 3. Segment

Explanation:

  • The Protocol Data Unit (PDU) of the Transport layer is called a segment in TCP and a datagram in UDP.

61. Protocol Data Unit (PDU) of network layer is known as

  1. Frame

  2. Packet

  3. Datagram

  4. Segment

Show me the answer

Answer: 2. Packet

Explanation:

  • The Protocol Data Unit (PDU) of the Network layer is called a packet.

62. A pseudo private data network that uses public bandwidth in combination with a tunneling protocol and security procedures is called

  1. Value Added Network (VAN)

  2. Virtual Private Network (VPN)

  3. Virtual Local Area Network (VLAN)

  4. Intranet

Show me the answer

Answer: 2. Virtual Private Network (VPN)

Explanation:

  • A VPN uses public bandwidth and tunneling protocols to create a secure, private network over a public network.

63. In OSI model, ______ layer is responsible for getting packets from source node to the destination node.

  1. Transport layer

  2. Network layer

  3. Data link layer

  4. Physical layer

Show me the answer

Answer: 2. Network layer

Explanation:

  • The Network layer is responsible for routing packets from the source node to the destination node.

64. Medium Access Control (MAC) address consists of --- number of bits.

  1. 32

  2. 48

  3. 64

  4. 128

Show me the answer

Answer: 2. 48

Explanation:

  • A MAC address is 48 bits long, typically represented as 12 hexadecimal digits.

65. FDDI stands for

  1. Fiber Detected Data Interface

  2. Fiber Detected Data Interchange

  3. Fiber Distributed Data Interchange

  4. Fiber Distributed Data Interface

Show me the answer

Answer: 4. Fiber Distributed Data Interface

Explanation:

  • FDDI stands for Fiber Distributed Data Interface, a standard for data transmission in a local area network.

66. Firewalls cannot prevent ______ attack.

  1. Denial of Service (DoS)

  2. Distributed Denial of Service (DDoS)

  3. Both of the above

  4. None of these

Show me the answer

Answer: 3. Both of the above

Explanation:

  • Firewalls are not effective against DoS or DDoS attacks, which overwhelm the network with traffic.

67. Symmetric cryptography uses

  1. Public and private keys for encryption and decryption

  2. Same key for both encryption and decryption

  3. Both of the above

  4. None of these

Show me the answer

Answer: 2. Same key for both encryption and decryption

Explanation:

  • Symmetric cryptography uses the same key for both encryption and decryption.

68. In OSI network architecture, the dialogue control and token management are the responsibilities of

  1. Session layer

  2. Network layer

  3. Transport layer

  4. Data link layer

Show me the answer

Answer: 1. Session layer

Explanation:

  • The Session layer is responsible for dialogue control and token management in the OSI model.

69. How many OSI layers are covered in the X.25 standard?

  1. Two

  2. Three

  3. Four

  4. Seven

Show me the answer

Answer: 2. Three

Explanation:

  • X.25 covers the Physical, Data Link, and Network layers of the OSI model.

70. Which of the following communication modes support two-way traffic but in only one direction at a time?

  1. Simplex

  2. Half Duplex

  3. Duplex

  4. None of these

Show me the answer

Answer: 2. Half Duplex

Explanation:

  • Half Duplex allows two-way communication but only in one direction at a time.

71. Which one of the following uses the highest number of layers in the OSI model?

  1. Bridge

  2. Switch

  3. Router

  4. Gateway

Show me the answer

Answer: 4. Gateway

Explanation:

  • Gateways operate at all seven layers of the OSI model, making them the most complex.

72. What is the subnet mask of Class C IP address with 4 bits of subnetting?

  1. 255.255.240.0

  2. 255.255.255.240

  3. 255.255.16.0

  4. 255.255.255.16

Show me the answer

Answer: 2. 255.255.255.240

Explanation:

  • For a Class C IP address with 4 bits of subnetting, the subnet mask is 255.255.255.240.

73. In Local Area Network (LAN), ____ protocol maps a dynamic IP address to a permanent physical media access control (MAC) address.

  1. Address Resolution protocol

  2. Point to Point protocol

  3. Network Address Translation protocol

  4. None of these

Show me the answer

Answer: 1. Address Resolution protocol

Explanation:

  • ARP (Address Resolution Protocol) maps a dynamic IP address to a MAC address.

  1. CSMA/CD is effective before a collision

  2. CSMA/CD is effective after a collision

  3. CSMA/CD is effective in both before and after a collision

  4. None of these

Show me the answer

Answer: 2. CSMA/CD is effective after a collision

Explanation:

  • CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is effective in detecting and resolving collisions after they occur.

75. Which statement is not correct in case of VLAN?

  1. VLAN is a logical overlay network that groups together a subset of devices that share a physical LAN

  2. VLANs can help manage broadcast traffic by forming multiple broadcast domains.

  3. VLAN separates an existing physical network into multiple physical networks

  4. Implementing VLANs reduces the security risks

Show me the answer

Answer: 3. VLAN separates an existing physical network into multiple physical networks

Explanation:

  • VLANs create logical networks within a physical network, but they do not physically separate the network.

  1. 1-Persistent CSMA

  2. P-Persistent CSMA

  3. Non-Persistent CSMA

  4. None of these

Show me the answer

Answer: 1. 1-Persistent CSMA

Explanation:

  • 1-Persistent CSMA has the highest number of collisions because devices transmit immediately when the channel is idle.

77. The subnet mask represented by the CIDR notation 20 (/20) is

  1. 255.255.255.0

  2. 255.255.248.0

  3. 255.255.240.0

  4. 255.255.224.0

Show me the answer

Answer: 3. 255.255.240.0

Explanation:

  • A CIDR notation of /20 corresponds to a subnet mask of 255.255.240.0.

78. ______ is the feature of NAT in Internet connectivity.

  1. It connects a large number of hosts to the global Internet using a smaller number of public IP address, thereby conserving IP address space

  2. It enhances security for private networks by keeping internal addressing private from the external network

  3. Both of the above

  4. None of these

Show me the answer

Answer: 3. Both of the above

Explanation:

  • NAT (Network Address Translation) conserves IP address space and enhances security by hiding internal IP addresses.

79. A routing protocol that refers to a gateway protocol which enables the Internet to exchange routing information between autonomous systems (AS) is known as

  1. BGP

  2. OSPF

  3. RIP

  4. Both B and C

Show me the answer

Answer: 1. BGP

Explanation:

  • BGP (Border Gateway Protocol) is used to exchange routing information between autonomous systems on the Internet.

80. Which transport layer protocol doesn't guarantee the delivery of packets?

  1. TCP

  2. UDP

  3. Both of the above

  4. None of these

Show me the answer

Answer: 2. UDP

Explanation:

  • UDP (User Datagram Protocol) does not guarantee the delivery of packets, unlike TCP.

81. Which of the following statements is not true in case of circuit switching and packet switching?

  1. Circuit switching is connection oriented but packet switching is connectionless

  2. In-Circuit switching, data is processed at the source system only

  3. In Packet switching, data is processed at all intermediate nodes including the source system

  4. Bandwidth utilization is more in circuit switching than packet switching

Show me the answer

Answer: 4. Bandwidth utilization is more in circuit switching than packet switching

Explanation:

  • Bandwidth utilization is more efficient in packet switching compared to circuit switching.

82. ______ is a network server that automatically assigns IP addresses, default gateways and other network parameters to client devices.

  1. DNS

  2. DHCP

  3. Web Server

  4. Proxy Server

Show me the answer

Answer: 2. DHCP

Explanation:

  • DHCP (Dynamic Host Configuration Protocol) automatically assigns IP addresses and other network parameters to client devices.

83. In IT/IS security, which happens first, Authentication or Authorization?

  1. Authentication

  2. Authorization

  3. Simultaneously

  4. Anyone can happen first

Show me the answer

Answer: 1. Authentication

Explanation:

  • Authentication happens first to verify the identity of the user, followed by authorization to grant access to resources.

  1. E-mail fraud

  2. SPAM

  3. Phishing

  4. None of these

Show me the answer

Answer: 3. Phishing

Explanation:

  • Phishing involves masquerading as a trustworthy entity to steal sensitive information.

85. ______ VPN allows users to connect remotely to an entire network and all its applications.

  1. IPSec VPN

  2. SSL VPN

  3. TLS VPN

  4. All of the above

Show me the answer

Answer: 1. IPSec VPN

Explanation:

  • IPSec VPN allows users to connect remotely to an entire network and access all its applications securely.

86. In IT/IS security, which access control type is the most secure and inflexible?

  1. Discretionary Access Control

  2. Mandatory Access Control

  3. Role-Based Access Control

  4. Rule-Based Access Control

Show me the answer

Answer: 2. Mandatory Access Control

Explanation:

  • Mandatory Access Control (MAC) is the most secure and inflexible access control model, as it enforces strict policies.

87. Which of the following statements is not true in case of IP address and MAC address?

  1. Both addresses uniquely identify the device on a network

  2. Both IP and MAC are logical addresses

  3. Compared to MAC address, IP address operates on a higher layer of the OSI model

  4. None of these

Show me the answer

Answer: 2. Both IP and MAC are logical addresses

Explanation:

  • MAC addresses are physical addresses, while IP addresses are logical addresses.

88. In computer networks, ___ refers to a gateway protocol that enables the internet to exchange routing information between autonomous systems (ASs).

  1. Open Shortest Path First

  2. Routing Information Protocol

  3. Border Gateway Protocol

  4. All of the above

Show me the answer

Answer: 3. Border Gateway Protocol

Explanation:

  • BGP (Border Gateway Protocol) is used to exchange routing information between autonomous systems on the Internet.

89. In computer networks, ___ is not a remote access protocol.

  1. SSH

  2. RDP

  3. RAS

  4. SNMP

Show me the answer

Answer: 4. SNMP

Explanation:

  • SNMP (Simple Network Management Protocol) is used for network management, not remote access.

90. Which of the following windows commands is used in network troubleshooting?

  1. Ping

  2. Tracert

  3. Ipconfig

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Ping, Tracert, and Ipconfig are all used for network troubleshooting in Windows.

91. Which statement is not correct in case of digital and handwritten signatures?

  1. A digital signature is a mathematical algorithm used to validate the authenticity and integrity of an electronic document

  2. Digital signature provides far more inherent security than handwritten signature

  3. Just like a handwritten signature, a digital signature is unique for every document

  4. Digital signature ensures authentication, integrity and non-repudiation of the signed document

Show me the answer

Answer: 3. Just like a handwritten signature, a digital signature is unique for every document

Explanation:

  • A digital signature is unique to the sender and the document, but it is not the same as a handwritten signature.

92. Identify the incorrect statement in case of IPS and IDS, in network security.

  1. IDS is a device or software application that monitors a network or systems for malicious activity or policy violations

  2. IPS controls access to IT networks in order to protect systems from attack and abuse

  3. Both IDS and IPS can block malicious traffic if an attack is identified before it spreads to the rest of the network

  4. None of these

Show me the answer

Answer: 3. Both IDS and IPS can block malicious traffic if an attack is identified before it spreads to the rest of the network

Explanation:

  • IDS (Intrusion Detection System) only detects and alerts about suspicious activity, while IPS (Intrusion Prevention System) can block malicious traffic.

93. Which cryptography needs an encryption key to be shared among users to communicate securely with each other?

  1. Symmetric cryptography

  2. Asymmetric cryptography

  3. Both of the above

  4. None of these

Show me the answer

Answer: 1. Symmetric cryptography

Explanation:

  • Symmetric cryptography requires the same key to be shared among users for encryption and decryption.

  1. Before a collision

  2. After a collision

  3. Both before and after a collision

  4. None of these

Show me the answer

Answer: 1. Before a collision

Explanation:

  • CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) is effective in avoiding collisions before they occur.

95. The subnet mask represented by the CIDR notation 25 (125) is

  1. 255.255.255.0

  2. 255.255.255.128

  3. 255.255.255.192

  4. 255.255.128.0

Show me the answer

Answer: 2. 255.255.255.128

Explanation:

  • A CIDR notation of /25 corresponds to a subnet mask of 255.255.255.128.

96. A routing protocol that refers to a gateway protocol which enables the Internet to exchange routing information within an autonomous system (AS) is known as

  1. BGP

  2. OSPF

  3. RIP

  4. Both B and C

Show me the answer

Answer: 4. Both B and C

Explanation:

  • OSPF (Open Shortest Path First) and RIP (Routing Information Protocol) are used for routing within an autonomous system.

97. In ___, receiver’s data is prevented from being overwhelmed.

  1. Flow control

  2. Congestion control

  3. Both flow and congestion control

  4. None of these

Show me the answer

Answer: 1. Flow control

Explanation:

  • Flow control prevents the receiver from being overwhelmed by regulating the rate of data transmission.

98. Which mechanism controls the entry of data packets into the network; enabling a better use of a shared network infrastructure and avoiding congestive collapse?

  1. Flow control

  2. Congestion control

  3. Both flow and congestion control

  4. None of these

Show me the answer

Answer: 2. Congestion control

Explanation:

  • Congestion control manages the flow of data packets to prevent network congestion and ensure efficient use of network resources.

99. In the cryptography world, RSA algorithm is used for _____.

  1. Symmetric cryptography

  2. Asymmetric cryptography

  3. Both of the above

  4. None of these

Show me the answer

Answer: 2. Asymmetric cryptography

Explanation:

  • RSA is an asymmetric cryptography algorithm that uses a pair of public and private keys.

100. A digital signature is a mathematical technique which validates _____ of the message, software or digital documents.

  1. Authenticity

  2. Message Integrity

  3. Non-repudiation

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • A digital signature ensures authenticity, message integrity, and non-repudiation of the signed document.

101. A process which verifies the identity of a user who wants to access the system is called

  1. Authentication

  2. Non-repudiation

  3. Integrity

  4. None of these

Show me the answer

Answer: 1. Authentication

Explanation:

  • Authentication is the process of verifying the identity of a user before granting access to a system.

102. In information security, --- ensures that a message has not been tampered with or altered during transmission.

  1. Authentication

  2. Non-repudiation

  3. Integrity

  4. None of these

Show me the answer

Answer: 3. Integrity

Explanation:

  • Integrity ensures that a message has not been altered or tampered with during transmission.

103. Which feature of digital signature ensures that no party can deny the authenticity of their signature on a document?

  1. Authentication

  2. Non-repudiation

  3. Integrity

  4. None of these

Show me the answer

Answer: 2. Non-repudiation

Explanation:

  • Non-repudiation ensures that a party cannot deny the authenticity of their signature on a document.

Last updated