set-2
51. Which of the following networking devices is used to connect two different networks?
52. An ______ is a network security tool that monitors network traffic for suspicious activity and issues alerts when such activity is discovered.
53. In computer networking, which protocol is used to map IP network address to hardware MAC address?
54. In OSI reference model, which layer is responsible for error-free, end-to-end (process-to-process) delivery of data from source host to destination host?
55. The X.25 standard specifies
56. Which one of the following network devices uses the higher number of layers in the OSI Model?
57. Firewall which is designed to monitor and filter incoming and outgoing network traffic based on an organization’s previously established security policies is implemented in
58. In information security, asymmetric cryptography uses______.
59. Protocol Data Unit (PDU) of data link layer is known as
60. Protocol Data Unit (PDU) of transport layer is known as
61. Protocol Data Unit (PDU) of network layer is known as
62. A pseudo private data network that uses public bandwidth in combination with a tunneling protocol and security procedures is called
63. In OSI model, ______ layer is responsible for getting packets from source node to the destination node.
64. Medium Access Control (MAC) address consists of --- number of bits.
65. FDDI stands for
66. Firewalls cannot prevent ______ attack.
67. Symmetric cryptography uses
68. In OSI network architecture, the dialogue control and token management are the responsibilities of
69. How many OSI layers are covered in the X.25 standard?
70. Which of the following communication modes support two-way traffic but in only one direction at a time?
71. Which one of the following uses the highest number of layers in the OSI model?
72. What is the subnet mask of Class C IP address with 4 bits of subnetting?
73. In Local Area Network (LAN), ____ protocol maps a dynamic IP address to a permanent physical media access control (MAC) address.
74. While transmitting signal in the data link layer, _____ is correct in case of CSMA/CD.
75. Which statement is not correct in case of VLAN?
76. While transmitting signal in the data link layer, ______ method has the highest number of collisions observed.
77. The subnet mask represented by the CIDR notation 20 (/20) is
78. ______ is the feature of NAT in Internet connectivity.
79. A routing protocol that refers to a gateway protocol which enables the Internet to exchange routing information between autonomous systems (AS) is known as
80. Which transport layer protocol doesn't guarantee the delivery of packets?
81. Which of the following statements is not true in case of circuit switching and packet switching?
82. ______ is a network server that automatically assigns IP addresses, default gateways and other network parameters to client devices.
83. In IT/IS security, which happens first, Authentication or Authorization?
84. A computer related threat which attempts to obtain sensitive information by masquerading as a trustworthy entity is called
85. ______ VPN allows users to connect remotely to an entire network and all its applications.
86. In IT/IS security, which access control type is the most secure and inflexible?
87. Which of the following statements is not true in case of IP address and MAC address?
88. In computer networks, ___ refers to a gateway protocol that enables the internet to exchange routing information between autonomous systems (ASs).
89. In computer networks, ___ is not a remote access protocol.
90. Which of the following windows commands is used in network troubleshooting?
91. Which statement is not correct in case of digital and handwritten signatures?
92. Identify the incorrect statement in case of IPS and IDS, in network security.
93. Which cryptography needs an encryption key to be shared among users to communicate securely with each other?
94. While transmitting signal in the data link layer, CSMA/CA is effective ___.
95. The subnet mask represented by the CIDR notation 25 (125) is
96. A routing protocol that refers to a gateway protocol which enables the Internet to exchange routing information within an autonomous system (AS) is known as
97. In ___, receiver’s data is prevented from being overwhelmed.
98. Which mechanism controls the entry of data packets into the network; enabling a better use of a shared network infrastructure and avoiding congestive collapse?
99. In the cryptography world, RSA algorithm is used for _____.
100. A digital signature is a mathematical technique which validates _____ of the message, software or digital documents.
101. A process which verifies the identity of a user who wants to access the system is called
102. In information security, --- ensures that a message has not been tampered with or altered during transmission.
103. Which feature of digital signature ensures that no party can deny the authenticity of their signature on a document?
Last updated