InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 101. |
A collection of computer from various location are working independently for a common objective is called computing (a) Cloud computing (b) Grid Computing (c) Share computing (d) Firewall |
|
Answer» Answer is (b) Grid Computing |
|
| 102. |
From the following select the IP address that is not in the same network. (a) 192.168.1.1 3 (b) 192.168.1.20 (c) 192.168.1.30 (d) 192.168.10.30 |
|
Answer» Answer is (d) 192.168.10.30 |
|
| 103. |
What are the two energing technologies developed in the expansion of Network (a) Grid computing (b) Cloud computing (c) Share computing (d) Python |
|
Answer» Answer is (a) Grid computing and (b) Cloud computing |
|
| 104. |
from the following IP address which part is used to represent the Network192.168.1.25 a) 168.1.25 b) 192.168.1 c) 192.168 d) 1.25 |
|
Answer» Answer is (b) 192.168.1 |
|
| 105. |
From the following which option is used to deny the entry of others from Internet or Network a) Firewall b) Protocol c) WiFi d) LiFi |
|
Answer» Answer is (a) Firewall |
|
| 106. |
From the following what is the data transfer capacity of Cat 7 cable (a) 18 Gbps (b) 20 Gbps (c) 10 Gbps (d) 10 Mbps |
|
Answer» Answer is (c) 10 Gbps |
|
| 107. |
From the following which device is used to send a copy of the data to all the computers in a network a) Switch b) Hub c) Scanner d) None of these |
|
Answer» Answer is (b) Hub |
|
| 108. |
What is the full form of Cat 7? (a) Category 7 (b) Cathode 7 (c) None of these |
|
Answer» a) Category 7 |
|
| 109. |
What is the full form of RJ45 |
|
Answer» Registered Jack 45 |
|
| 110. |
What is the full form of UTP |
|
Answer» Unshielded Twisted Pair |
|
| 111. |
How is firewall useful in ensuring network security? |
|
Answer» Firewall regulates traffic by blocking certain websites. It prevents virus attacks. All messages which do not meet the required criteria are blocked. |
|
| 112. |
Mr. John wants to prevent unauthorized access to/from his company's local area network. Write the name of a system (software/ hardware), which he should install to do the same. |
|
Answer» He should install Firewall. |
|
| 113. |
List some methods which are used for network security. |
|
Answer» Measures to secure a network are: Use of (i) Login-Password (ii) Firewall (iii) Antivirus software (iv) File permissions |
|
| 114. |
List 2 measures to secure a network. |
|
Answer» Measures to secure a network are: Use of (i) Login-Password (ii) Firewall (iii) Antivirus software (iv) File permissions |
|
| 115. |
When the user browses a website, the web server sends a text file to the web browser. What is the name of this? |
|
Answer» The name of Cookies. |
|
| 116. |
How does 'Denial of Service' attack disrupt an organization's network resources? |
|
Answer» DOS attack prevents the legitimate users from accessing or using the resources and information. This type of attack may eat up all the resources of the system and computer comes to a halt state. It leads to : (i) Denial of Access to Information. (ii) Denial of Access to Applications. (iii) Denial of Access to Systems. (iv) Denial of Access to Communication. |
|