set-2
51. Which of the following networking devices is used to connect two different networks?
- Hub
- Switch
- Router
- All of the above
Show me the answer
Answer: 3. Router
Explanation:
- A router is used to connect two different networks and route data between them.
52. An ______ is a network security tool that monitors network traffic for suspicious activity and issues alerts when such activity is discovered.
- Intrusion Detection System (IDS)
- Intrusion Prevention System (IPS)
- Both of the above
- None of these
Show me the answer
Answer: 1. Intrusion Detection System (IDS)
Explanation:
- An IDS monitors network traffic for suspicious activity and issues alerts but does not take action to block the activity.
53. In computer networking, which protocol is used to map IP network address to hardware MAC address?
- SNMP
- ARP
- TCP/IP
- PPP
Show me the answer
Answer: 2. ARP
Explanation:
- ARP (Address Resolution Protocol) is used to map an IP address to a MAC address.
54. In OSI reference model, which layer is responsible for error-free, end-to-end (process-to-process) delivery of data from source host to destination host?
- Network layer
- Transport layer
- Presentation layer
- Application layer
Show me the answer
Answer: 2. Transport layer
Explanation:
- The Transport layer ensures error-free, end-to-end delivery of data between processes on different hosts.
55. The X.25 standard specifies
- DTE/DCE interface
- Start – stop data
- Data bit rate
- Dial up access
Show me the answer
Answer: 1. DTE/DCE interface
Explanation:
- X.25 is a protocol suite that specifies the interface between Data Terminal Equipment (DTE) and Data Circuit-terminating Equipment (DCE).
56. Which one of the following network devices uses the higher number of layers in the OSI Model?
- Switch
- Router
- Bridge
- All use the same number of layers
Show me the answer
Answer: 2. Router
Explanation:
- Routers operate at the Network layer (Layer 3) of the OSI model, while switches and bridges operate at the Data Link layer (Layer 2).
57. Firewall which is designed to monitor and filter incoming and outgoing network traffic based on an organization’s previously established security policies is implemented in
- Hardware
- Software
- Combination of hardware and software
- All of the above
Show me the answer
Answer: 4. All of the above
Explanation:
- Firewalls can be implemented in hardware, software, or a combination of both.
58. In information security, asymmetric cryptography uses______.
- Public and private keys for encryption and decryption
- Same key for both encryption and decryption
- Both of the above
- None of these
Show me the answer
Answer: 1. Public and private keys for encryption and decryption
Explanation:
- Asymmetric cryptography uses a pair of keys: a public key for encryption and a private key for decryption.
59. Protocol Data Unit (PDU) of data link layer is known as
- Frame
- Datagram
- Message
- Segment
Show me the answer
Answer: 1. Frame
Explanation:
- The Protocol Data Unit (PDU) of the Data Link layer is called a frame.
60. Protocol Data Unit (PDU) of transport layer is known as
- Frame
- Datagram
- Segment
- Both B and C
Show me the answer
Answer: 3. Segment
Explanation:
- The Protocol Data Unit (PDU) of the Transport layer is called a segment in TCP and a datagram in UDP.
61. Protocol Data Unit (PDU) of network layer is known as
- Frame
- Packet
- Datagram
- Segment
Show me the answer
Answer: 2. Packet
Explanation:
- The Protocol Data Unit (PDU) of the Network layer is called a packet.
62. A pseudo private data network that uses public bandwidth in combination with a tunneling protocol and security procedures is called
- Value Added Network (VAN)
- Virtual Private Network (VPN)
- Virtual Local Area Network (VLAN)
- Intranet
Show me the answer
Answer: 2. Virtual Private Network (VPN)
Explanation:
- A VPN uses public bandwidth and tunneling protocols to create a secure, private network over a public network.
63. In OSI model, ______ layer is responsible for getting packets from source node to the destination node.
- Transport layer
- Network layer
- Data link layer
- Physical layer
Show me the answer
Answer: 2. Network layer
Explanation:
- The Network layer is responsible for routing packets from the source node to the destination node.
64. Medium Access Control (MAC) address consists of --- number of bits.
- 32
- 48
- 64
- 128
Show me the answer
Answer: 2. 48
Explanation:
- A MAC address is 48 bits long, typically represented as 12 hexadecimal digits.
65. FDDI stands for
- Fiber Detected Data Interface
- Fiber Detected Data Interchange
- Fiber Distributed Data Interchange
- Fiber Distributed Data Interface
Show me the answer
Answer: 4. Fiber Distributed Data Interface
Explanation:
- FDDI stands for Fiber Distributed Data Interface, a standard for data transmission in a local area network.
66. Firewalls cannot prevent ______ attack.
- Denial of Service (DoS)
- Distributed Denial of Service (DDoS)
- Both of the above
- None of these
Show me the answer
Answer: 3. Both of the above
Explanation:
- Firewalls are not effective against DoS or DDoS attacks, which overwhelm the network with traffic.
67. Symmetric cryptography uses
- Public and private keys for encryption and decryption
- Same key for both encryption and decryption
- Both of the above
- None of these
Show me the answer
Answer: 2. Same key for both encryption and decryption
Explanation:
- Symmetric cryptography uses the same key for both encryption and decryption.
68. In OSI network architecture, the dialogue control and token management are the responsibilities of
- Session layer
- Network layer
- Transport layer
- Data link layer
Show me the answer
Answer: 1. Session layer
Explanation:
- The Session layer is responsible for dialogue control and token management in the OSI model.
69. How many OSI layers are covered in the X.25 standard?
- Two
- Three
- Four
- Seven
Show me the answer
Answer: 2. Three
Explanation:
- X.25 covers the Physical, Data Link, and Network layers of the OSI model.
70. Which of the following communication modes support two-way traffic but in only one direction at a time?
- Simplex
- Half Duplex
- Duplex
- None of these
Show me the answer
Answer: 2. Half Duplex
Explanation:
- Half Duplex allows two-way communication but only in one direction at a time.
71. Which one of the following uses the highest number of layers in the OSI model?
- Bridge
- Switch
- Router
- Gateway
Show me the answer
Answer: 4. Gateway
Explanation:
- Gateways operate at all seven layers of the OSI model, making them the most complex.
72. What is the subnet mask of Class C IP address with 4 bits of subnetting?
- 255.255.240.0
- 255.255.255.240
- 255.255.16.0
- 255.255.255.16
Show me the answer
Answer: 2. 255.255.255.240
Explanation:
- For a Class C IP address with 4 bits of subnetting, the subnet mask is 255.255.255.240.
73. In Local Area Network (LAN), ____ protocol maps a dynamic IP address to a permanent physical media access control (MAC) address.
- Address Resolution protocol
- Point to Point protocol
- Network Address Translation protocol
- None of these
Show me the answer
Answer: 1. Address Resolution protocol
Explanation:
- ARP (Address Resolution Protocol) maps a dynamic IP address to a MAC address.
74. While transmitting signal in the data link layer, _____ is correct in case of CSMA/CD.
- CSMA/CD is effective before a collision
- CSMA/CD is effective after a collision
- CSMA/CD is effective in both before and after a collision
- None of these
Show me the answer
Answer: 2. CSMA/CD is effective after a collision
Explanation:
- CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is effective in detecting and resolving collisions after they occur.
75. Which statement is not correct in case of VLAN?
- VLAN is a logical overlay network that groups together a subset of devices that share a physical LAN
- VLANs can help manage broadcast traffic by forming multiple broadcast domains.
- VLAN separates an existing physical network into multiple physical networks
- Implementing VLANs reduces the security risks
Show me the answer
Answer: 3. VLAN separates an existing physical network into multiple physical networks
Explanation:
- VLANs create logical networks within a physical network, but they do not physically separate the network.
76. While transmitting signal in the data link layer, ______ method has the highest number of collisions observed.
- 1-Persistent CSMA
- P-Persistent CSMA
- Non-Persistent CSMA
- None of these
Show me the answer
Answer: 1. 1-Persistent CSMA
Explanation:
- 1-Persistent CSMA has the highest number of collisions because devices transmit immediately when the channel is idle.
77. The subnet mask represented by the CIDR notation 20 (/20) is
- 255.255.255.0
- 255.255.248.0
- 255.255.240.0
- 255.255.224.0
Show me the answer
Answer: 3. 255.255.240.0
Explanation:
- A CIDR notation of /20 corresponds to a subnet mask of 255.255.240.0.
78. ______ is the feature of NAT in Internet connectivity.
- It connects a large number of hosts to the global Internet using a smaller number of public IP address, thereby conserving IP address space
- It enhances security for private networks by keeping internal addressing private from the external network
- Both of the above
- None of these
Show me the answer
Answer: 3. Both of the above
Explanation:
- NAT (Network Address Translation) conserves IP address space and enhances security by hiding internal IP addresses.
79. A routing protocol that refers to a gateway protocol which enables the Internet to exchange routing information between autonomous systems (AS) is known as
- BGP
- OSPF
- RIP
- Both B and C
Show me the answer
Answer: 1. BGP
Explanation:
- BGP (Border Gateway Protocol) is used to exchange routing information between autonomous systems on the Internet.
80. Which transport layer protocol doesn’t guarantee the delivery of packets?
- TCP
- UDP
- Both of the above
- None of these
Show me the answer
Answer: 2. UDP
Explanation:
- UDP (User Datagram Protocol) does not guarantee the delivery of packets, unlike TCP.
81. Which of the following statements is not true in case of circuit switching and packet switching?
- Circuit switching is connection oriented but packet switching is connectionless
- In-Circuit switching, data is processed at the source system only
- In Packet switching, data is processed at all intermediate nodes including the source system
- Bandwidth utilization is more in circuit switching than packet switching
Show me the answer
Answer: 4. Bandwidth utilization is more in circuit switching than packet switching
Explanation:
- Bandwidth utilization is more efficient in packet switching compared to circuit switching.
82. ______ is a network server that automatically assigns IP addresses, default gateways and other network parameters to client devices.
- DNS
- DHCP
- Web Server
- Proxy Server
Show me the answer
Answer: 2. DHCP
Explanation:
- DHCP (Dynamic Host Configuration Protocol) automatically assigns IP addresses and other network parameters to client devices.
83. In IT/IS security, which happens first, Authentication or Authorization?
- Authentication
- Authorization
- Simultaneously
- Anyone can happen first
Show me the answer
Answer: 1. Authentication
Explanation:
- Authentication happens first to verify the identity of the user, followed by authorization to grant access to resources.
84. A computer related threat which attempts to obtain sensitive information by masquerading as a trustworthy entity is called
- E-mail fraud
- SPAM
- Phishing
- None of these
Show me the answer
Answer: 3. Phishing
Explanation:
- Phishing involves masquerading as a trustworthy entity to steal sensitive information.
85. ______ VPN allows users to connect remotely to an entire network and all its applications.
- IPSec VPN
- SSL VPN
- TLS VPN
- All of the above
Show me the answer
Answer: 1. IPSec VPN
Explanation:
- IPSec VPN allows users to connect remotely to an entire network and access all its applications securely.
86. In IT/IS security, which access control type is the most secure and inflexible?
- Discretionary Access Control
- Mandatory Access Control
- Role-Based Access Control
- Rule-Based Access Control
Show me the answer
Answer: 2. Mandatory Access Control
Explanation:
- Mandatory Access Control (MAC) is the most secure and inflexible access control model, as it enforces strict policies.
87. Which of the following statements is not true in case of IP address and MAC address?
- Both addresses uniquely identify the device on a network
- Both IP and MAC are logical addresses
- Compared to MAC address, IP address operates on a higher layer of the OSI model
- None of these
Show me the answer
Answer: 2. Both IP and MAC are logical addresses
Explanation:
- MAC addresses are physical addresses, while IP addresses are logical addresses.
88. In computer networks, ___ refers to a gateway protocol that enables the internet to exchange routing information between autonomous systems (ASs).
- Open Shortest Path First
- Routing Information Protocol
- Border Gateway Protocol
- All of the above
Show me the answer
Answer: 3. Border Gateway Protocol
Explanation:
- BGP (Border Gateway Protocol) is used to exchange routing information between autonomous systems on the Internet.
89. In computer networks, ___ is not a remote access protocol.
- SSH
- RDP
- RAS
- SNMP
Show me the answer
Answer: 4. SNMP
Explanation:
- SNMP (Simple Network Management Protocol) is used for network management, not remote access.
90. Which of the following windows commands is used in network troubleshooting?
- Ping
- Tracert
- Ipconfig
- All of the above
Show me the answer
Answer: 4. All of the above
Explanation:
- Ping, Tracert, and Ipconfig are all used for network troubleshooting in Windows.
91. Which statement is not correct in case of digital and handwritten signatures?
- A digital signature is a mathematical algorithm used to validate the authenticity and integrity of an electronic document
- Digital signature provides far more inherent security than handwritten signature
- Just like a handwritten signature, a digital signature is unique for every document
- Digital signature ensures authentication, integrity and non-repudiation of the signed document
Show me the answer
Answer: 3. Just like a handwritten signature, a digital signature is unique for every document
Explanation:
- A digital signature is unique to the sender and the document, but it is not the same as a handwritten signature.
92. Identify the incorrect statement in case of IPS and IDS, in network security.
- IDS is a device or software application that monitors a network or systems for malicious activity or policy violations
- IPS controls access to IT networks in order to protect systems from attack and abuse
- Both IDS and IPS can block malicious traffic if an attack is identified before it spreads to the rest of the network
- None of these
Show me the answer
Answer: 3. Both IDS and IPS can block malicious traffic if an attack is identified before it spreads to the rest of the network
Explanation:
- IDS (Intrusion Detection System) only detects and alerts about suspicious activity, while IPS (Intrusion Prevention System) can block malicious traffic.
93. Which cryptography needs an encryption key to be shared among users to communicate securely with each other?
- Symmetric cryptography
- Asymmetric cryptography
- Both of the above
- None of these
Show me the answer
Answer: 1. Symmetric cryptography
Explanation:
- Symmetric cryptography requires the same key to be shared among users for encryption and decryption.
94. While transmitting signal in the data link layer, CSMA/CA is effective ___.
- Before a collision
- After a collision
- Both before and after a collision
- None of these
Show me the answer
Answer: 1. Before a collision
Explanation:
- CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) is effective in avoiding collisions before they occur.
95. The subnet mask represented by the CIDR notation 25 (125) is
- 255.255.255.0
- 255.255.255.128
- 255.255.255.192
- 255.255.128.0
Show me the answer
Answer: 2. 255.255.255.128
Explanation:
- A CIDR notation of /25 corresponds to a subnet mask of 255.255.255.128.
96. A routing protocol that refers to a gateway protocol which enables the Internet to exchange routing information within an autonomous system (AS) is known as
- BGP
- OSPF
- RIP
- Both B and C
Show me the answer
Answer: 4. Both B and C
Explanation:
- OSPF (Open Shortest Path First) and RIP (Routing Information Protocol) are used for routing within an autonomous system.
97. In ___, receiver’s data is prevented from being overwhelmed.
- Flow control
- Congestion control
- Both flow and congestion control
- None of these
Show me the answer
Answer: 1. Flow control
Explanation:
- Flow control prevents the receiver from being overwhelmed by regulating the rate of data transmission.
98. Which mechanism controls the entry of data packets into the network; enabling a better use of a shared network infrastructure and avoiding congestive collapse?
- Flow control
- Congestion control
- Both flow and congestion control
- None of these
Show me the answer
Answer: 2. Congestion control
Explanation:
- Congestion control manages the flow of data packets to prevent network congestion and ensure efficient use of network resources.
99. In the cryptography world, RSA algorithm is used for _____.
- Symmetric cryptography
- Asymmetric cryptography
- Both of the above
- None of these
Show me the answer
Answer: 2. Asymmetric cryptography
Explanation:
- RSA is an asymmetric cryptography algorithm that uses a pair of public and private keys.
100. A digital signature is a mathematical technique which validates _____ of the message, software or digital documents.
- Authenticity
- Message Integrity
- Non-repudiation
- All of the above
Show me the answer
Answer: 4. All of the above
Explanation:
- A digital signature ensures authenticity, message integrity, and non-repudiation of the signed document.
101. A process which verifies the identity of a user who wants to access the system is called
- Authentication
- Non-repudiation
- Integrity
- None of these
Show me the answer
Answer: 1. Authentication
Explanation:
- Authentication is the process of verifying the identity of a user before granting access to a system.
102. In information security, --- ensures that a message has not been tampered with or altered during transmission.
- Authentication
- Non-repudiation
- Integrity
- None of these
Show me the answer
Answer: 3. Integrity
Explanation:
- Integrity ensures that a message has not been altered or tampered with during transmission.
103. Which feature of digital signature ensures that no party can deny the authenticity of their signature on a document?
- Authentication
- Non-repudiation
- Integrity
- None of these
Show me the answer
Answer: 2. Non-repudiation
Explanation:
- Non-repudiation ensures that a party cannot deny the authenticity of their signature on a document.