set-2
51. Which of the following networking devices is used to connect two different networks?
Hub
Switch
Router
All of the above
52. An ______ is a network security tool that monitors network traffic for suspicious activity and issues alerts when such activity is discovered.
Intrusion Detection System (IDS)
Intrusion Prevention System (IPS)
Both of the above
None of these
53. In computer networking, which protocol is used to map IP network address to hardware MAC address?
SNMP
ARP
TCP/IP
PPP
54. In OSI reference model, which layer is responsible for error-free, end-to-end (process-to-process) delivery of data from source host to destination host?
Network layer
Transport layer
Presentation layer
Application layer
55. The X.25 standard specifies
DTE/DCE interface
Start – stop data
Data bit rate
Dial up access
56. Which one of the following network devices uses the higher number of layers in the OSI Model?
Switch
Router
Bridge
All use the same number of layers
57. Firewall which is designed to monitor and filter incoming and outgoing network traffic based on an organization’s previously established security policies is implemented in
Hardware
Software
Combination of hardware and software
All of the above
58. In information security, asymmetric cryptography uses______.
Public and private keys for encryption and decryption
Same key for both encryption and decryption
Both of the above
None of these
59. Protocol Data Unit (PDU) of data link layer is known as
Frame
Datagram
Message
Segment
60. Protocol Data Unit (PDU) of transport layer is known as
Frame
Datagram
Segment
Both B and C
61. Protocol Data Unit (PDU) of network layer is known as
Frame
Packet
Datagram
Segment
62. A pseudo private data network that uses public bandwidth in combination with a tunneling protocol and security procedures is called
Value Added Network (VAN)
Virtual Private Network (VPN)
Virtual Local Area Network (VLAN)
Intranet
63. In OSI model, ______ layer is responsible for getting packets from source node to the destination node.
Transport layer
Network layer
Data link layer
Physical layer
64. Medium Access Control (MAC) address consists of --- number of bits.
32
48
64
128
65. FDDI stands for
Fiber Detected Data Interface
Fiber Detected Data Interchange
Fiber Distributed Data Interchange
Fiber Distributed Data Interface
66. Firewalls cannot prevent ______ attack.
Denial of Service (DoS)
Distributed Denial of Service (DDoS)
Both of the above
None of these
67. Symmetric cryptography uses
Public and private keys for encryption and decryption
Same key for both encryption and decryption
Both of the above
None of these
68. In OSI network architecture, the dialogue control and token management are the responsibilities of
Session layer
Network layer
Transport layer
Data link layer
69. How many OSI layers are covered in the X.25 standard?
Two
Three
Four
Seven
70. Which of the following communication modes support two-way traffic but in only one direction at a time?
Simplex
Half Duplex
Duplex
None of these
71. Which one of the following uses the highest number of layers in the OSI model?
Bridge
Switch
Router
Gateway
72. What is the subnet mask of Class C IP address with 4 bits of subnetting?
255.255.240.0
255.255.255.240
255.255.16.0
255.255.255.16
73. In Local Area Network (LAN), ____ protocol maps a dynamic IP address to a permanent physical media access control (MAC) address.
Address Resolution protocol
Point to Point protocol
Network Address Translation protocol
None of these
74. While transmitting signal in the data link layer, _____ is correct in case of CSMA/CD.
CSMA/CD is effective before a collision
CSMA/CD is effective after a collision
CSMA/CD is effective in both before and after a collision
None of these
75. Which statement is not correct in case of VLAN?
VLAN is a logical overlay network that groups together a subset of devices that share a physical LAN
VLANs can help manage broadcast traffic by forming multiple broadcast domains.
VLAN separates an existing physical network into multiple physical networks
Implementing VLANs reduces the security risks
76. While transmitting signal in the data link layer, ______ method has the highest number of collisions observed.
1-Persistent CSMA
P-Persistent CSMA
Non-Persistent CSMA
None of these
77. The subnet mask represented by the CIDR notation 20 (/20) is
255.255.255.0
255.255.248.0
255.255.240.0
255.255.224.0
78. ______ is the feature of NAT in Internet connectivity.
It connects a large number of hosts to the global Internet using a smaller number of public IP address, thereby conserving IP address space
It enhances security for private networks by keeping internal addressing private from the external network
Both of the above
None of these
79. A routing protocol that refers to a gateway protocol which enables the Internet to exchange routing information between autonomous systems (AS) is known as
BGP
OSPF
RIP
Both B and C
80. Which transport layer protocol doesn't guarantee the delivery of packets?
TCP
UDP
Both of the above
None of these
81. Which of the following statements is not true in case of circuit switching and packet switching?
Circuit switching is connection oriented but packet switching is connectionless
In-Circuit switching, data is processed at the source system only
In Packet switching, data is processed at all intermediate nodes including the source system
Bandwidth utilization is more in circuit switching than packet switching
82. ______ is a network server that automatically assigns IP addresses, default gateways and other network parameters to client devices.
DNS
DHCP
Web Server
Proxy Server
83. In IT/IS security, which happens first, Authentication or Authorization?
Authentication
Authorization
Simultaneously
Anyone can happen first
84. A computer related threat which attempts to obtain sensitive information by masquerading as a trustworthy entity is called
E-mail fraud
SPAM
Phishing
None of these
85. ______ VPN allows users to connect remotely to an entire network and all its applications.
IPSec VPN
SSL VPN
TLS VPN
All of the above
86. In IT/IS security, which access control type is the most secure and inflexible?
Discretionary Access Control
Mandatory Access Control
Role-Based Access Control
Rule-Based Access Control
87. Which of the following statements is not true in case of IP address and MAC address?
Both addresses uniquely identify the device on a network
Both IP and MAC are logical addresses
Compared to MAC address, IP address operates on a higher layer of the OSI model
None of these
88. In computer networks, ___ refers to a gateway protocol that enables the internet to exchange routing information between autonomous systems (ASs).
Open Shortest Path First
Routing Information Protocol
Border Gateway Protocol
All of the above
89. In computer networks, ___ is not a remote access protocol.
SSH
RDP
RAS
SNMP
90. Which of the following windows commands is used in network troubleshooting?
Ping
Tracert
Ipconfig
All of the above
91. Which statement is not correct in case of digital and handwritten signatures?
A digital signature is a mathematical algorithm used to validate the authenticity and integrity of an electronic document
Digital signature provides far more inherent security than handwritten signature
Just like a handwritten signature, a digital signature is unique for every document
Digital signature ensures authentication, integrity and non-repudiation of the signed document
92. Identify the incorrect statement in case of IPS and IDS, in network security.
IDS is a device or software application that monitors a network or systems for malicious activity or policy violations
IPS controls access to IT networks in order to protect systems from attack and abuse
Both IDS and IPS can block malicious traffic if an attack is identified before it spreads to the rest of the network
None of these
93. Which cryptography needs an encryption key to be shared among users to communicate securely with each other?
Symmetric cryptography
Asymmetric cryptography
Both of the above
None of these
94. While transmitting signal in the data link layer, CSMA/CA is effective ___.
Before a collision
After a collision
Both before and after a collision
None of these
95. The subnet mask represented by the CIDR notation 25 (125) is
255.255.255.0
255.255.255.128
255.255.255.192
255.255.128.0
96. A routing protocol that refers to a gateway protocol which enables the Internet to exchange routing information within an autonomous system (AS) is known as
BGP
OSPF
RIP
Both B and C
97. In ___, receiver’s data is prevented from being overwhelmed.
Flow control
Congestion control
Both flow and congestion control
None of these
98. Which mechanism controls the entry of data packets into the network; enabling a better use of a shared network infrastructure and avoiding congestive collapse?
Flow control
Congestion control
Both flow and congestion control
None of these
99. In the cryptography world, RSA algorithm is used for _____.
Symmetric cryptography
Asymmetric cryptography
Both of the above
None of these
100. A digital signature is a mathematical technique which validates _____ of the message, software or digital documents.
Authenticity
Message Integrity
Non-repudiation
All of the above
101. A process which verifies the identity of a user who wants to access the system is called
Authentication
Non-repudiation
Integrity
None of these
102. In information security, --- ensures that a message has not been tampered with or altered during transmission.
Authentication
Non-repudiation
Integrity
None of these
103. Which feature of digital signature ensures that no party can deny the authenticity of their signature on a document?
Authentication
Non-repudiation
Integrity
None of these
Last updated