Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

101.

A collection of computer from various location are working independently for a common objective is called computing (a) Cloud computing (b) Grid Computing (c) Share computing (d) Firewall

Answer»

Answer is (b) Grid Computing

102.

From the following select the IP address that is not in the same network. (a) 192.168.1.1 3 (b) 192.168.1.20 (c) 192.168.1.30 (d) 192.168.10.30

Answer»

Answer is (d) 192.168.10.30

103.

What are the two energing technologies developed in the expansion of Network (a) Grid computing (b) Cloud computing (c) Share computing (d) Python

Answer»

Answer is (a) Grid computing and 

(b) Cloud computing

104.

from the following IP address which part is used to represent the Network192.168.1.25 a) 168.1.25 b) 192.168.1 c) 192.168 d) 1.25

Answer»

Answer is (b) 192.168.1

105.

From the following which option is used to deny the entry of others from Internet or Network a) Firewall b) Protocol c) WiFi d) LiFi

Answer»

Answer is (a) Firewall

106.

From the following what is the data transfer capacity of Cat 7 cable (a) 18 Gbps (b) 20 Gbps (c) 10 Gbps (d) 10 Mbps

Answer»

Answer is (c) 10 Gbps

107.

From the following which device is used to send a copy of the data to all the computers in a network a) Switch b) Hub c) Scanner d) None of these

Answer»

Answer is (b) Hub

108.

What is the full form of Cat 7? (a) Category 7 (b) Cathode 7 (c) None of these

Answer»

a) Category 7

109.

What is the full form of RJ45

Answer»

Registered Jack 45

110.

What is the full form of UTP

Answer»

Unshielded Twisted Pair

111.

How is firewall useful in ensuring network security?

Answer»

Firewall regulates traffic by blocking certain websites. It prevents virus attacks. All messages which do not meet the required criteria are blocked.

112.

Mr. John wants to prevent unauthorized access to/from his company's local area network. Write the name of a system (software/ hardware), which he should install to do the same.

Answer»

He should install Firewall.

113.

List some methods which are used for network security.

Answer»

Measures to secure a network are: Use of

(i) Login-Password

(ii) Firewall

(iii) Antivirus software

(iv) File permissions

114.

List 2 measures to secure a network.

Answer»

Measures to secure a network are: Use of

(i) Login-Password

(ii) Firewall

(iii) Antivirus software

(iv) File permissions

115.

When the user browses a website, the web server sends a text file to the web browser. What is the name of this?

Answer»

The name of Cookies.

116.

How does 'Denial of Service' attack disrupt an organization's network resources?

Answer»

DOS attack prevents the legitimate users from accessing or using the resources and information. This type of attack may eat up all the resources of the system and computer comes to a halt state.

It leads to :

(i) Denial of Access to Information.

(ii) Denial of Access to Applications.

(iii) Denial of Access to Systems.

(iv) Denial of Access to Communication.