1 .
It is the one which provides the facility of exchanging information between computing devices and is a combination of hardware and software.
A.  Digital device
B.  Network
C.  Peripheral
D.  Expansion board
E.  None of these
View Answer Discuss in Forum
2 .
The internal network of a company is very large and would like to subnet into smaller parts. From the options given below, the device that will not be used to separate LAN and still protect critical resources is
A.  The modem between computers
B.  A router between subnet
C.  An internal firewall
D.  A switch between departments
E.  None of these
View Answer Discuss in Forum
3 .
Which topology is used in Ethernet?
A.  Ring
B.  Mesh
C.  Bus
D.  Line
E.  None of these
View Answer Discuss in Forum
4 .
These are the components of an Ethernet LAN except
A.  Fibre
B.  Access point
C.  Coax
D.  STP
E.  None of these
View Answer Discuss in Forum
5 .
Based on the packet's address, the device that has been designed to forward packets to specific ports is
A.  specialty hub
B.  filtering hub
C.  port hub
D.  switching hub
E.  None of these
View Answer Discuss in Forum
6 .
Which one of the following devices is needed to communicate with computers using telephone lines?
A.  VDU
B.  Modem
C.  Disk
D.  CPU
E.  None of these
View Answer Discuss in Forum
7 .
To subnet LAN directly on the network server and to protect the resources of company that receives internet access through a network or gateway resources, the device which is best suited is
A.  A router which will also act as a bridge
B.  VLAN
C.  A multi-homed firewall
D.  DSL modem
E.  None of these
View Answer Discuss in Forum
8 .
The benefit of using a firewall for LAN is
A.  It provides greater security to LAN
B.  It provide stricter access control to critical resources
C.  Both 1 and 2
D.  Neither 1 nor 2
E.  None of these
View Answer Discuss in Forum
9 .
Which one of the following requires phone line but offers faster access speed than the dial up connection?
A.  digital subscefer line
B.  cable access
C.  fibre optic serving
D.  modem
E.  None of these
View Answer Discuss in Forum
10 .
When static packet filter is used on the router then the statement which is not correct for firewall protection is
A.  Static packet filtering is less secure than stateful filtering
B.  Static packet filtering is more secure than dynamic packet filtering
C.  Static packet filtering is less secure than dynamic proxy filtering
D.  All of the above
E.  None of these
View Answer Discuss in Forum
11 .
Which topology is used for large networks?
A.  Bus
B.  Line
C.  Ring
D.  Star
E.  None of these
View Answer Discuss in Forum
12 .
In which OSI layers a packet filtering firewall operates?
A.  At the network
B.  At the gateway layer
C.  At the transport layer
D.  All of the above
E.  None of these
View Answer Discuss in Forum
13 .
Which one of the following statement is not the benefit of firewall?
A.  It limits security exposure
B.  It is used for logging internet activity
C.  It enforces the organizations security policy
D.  It protects against virus
E.  None of these
View Answer Discuss in Forum
14 .
In a LAN network which one of the following allows users to share computer programs and data?
A.  File server
B.  Print server
C.  Communication server
D.  All of the above
E.  None of these
View Answer Discuss in Forum
15 .
The Rate of transfer of data in LAN is
A.  Tera bits per second
B.  Kilo bits per second
C.  Mega bits per second
D.  Bits per second
E.  None of these
View Answer Discuss in Forum
16 .
Modems are configured in such a manner that any incoming calls are automatically answered. Manufacturer provides inbuilt modems in many user computers. In this case the greatest security risk when dealing with the modems is
A.  Server access without the knowledge of network administrator
B.  Remote access without the knowledge of network administrator
C.  Local access without the knowledge of network administrator
D.  Client access without the knowledge of network administrator
E.  None of these
View Answer Discuss in Forum
17 .
Other than the dial-up connection, the network connection applicable to RAS is
A.  VPN
B.  ISDN
C.  DSL
D.  All of the above
E.  None of these
View Answer Discuss in Forum
18 .
IPSec is designed to provide the security at the
A.  transport layer
B.  network layer
C.  application layer
D.  session layer
E.  None of these
View Answer Discuss in Forum
19 .
Network layer firewall has two sub-categories as
A.  stateful firewall and stateless firewall
B.  bit oriented firewall and byte oriented firewall
C.  frame firewall and packet firewall
D.  All of the above
E.  None of these
View Answer Discuss in Forum
20 .
WPA2 is used for security in
A.  ethernet
B.  bluetooth
C.  wifi
D.  All of the above
E.  None of these
View Answer Discuss in Forum
21 .
An attempt to make a computer resource unavailable to its intended users is called
A.  denial of service attack
B.  virus attack
C.  worms attack
D.  botnet process
E.  None of these
View Answer Discuss in Forum
22 .
Extensible authentication protocol is authentication framework frequently used in
A.  wired personal area network
B.  wireless networks
C.  wired local area network
D.  All of the above
E.  None of these
View Answer Discuss in Forum
23 .
PGP (Pretty good privacy) encrypts data by using a block cipher called
A.  international data encryption algorithm
B.  private data encryption algorithm
C.  intrenet data encryption algorithm
D.  all of the above
E.  None of these
View Answer Discuss in Forum
24 .
When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called
A.  DNS lookup
B.  DNS hijacking
C.  DNS spoofing
D.  all of the above
E.  None of these
View Answer Discuss in Forum
25 .
What type of RJ45 UTP cable is used between switches?
A.  Crossover cable
B.  straight through
C.  Crossover with a router in between the two switches
D.  Crossover with a CSU/DSU
E.  None of these
View Answer Discuss in Forum
26 .
Which of the following are unique characteristics of halfduplex Ethernet when compared to full-duplex Ethernet?
1. Half-duplex Ethernet operates in a shared collision domain.
2. Half-duplex Ethernet operates in a private collision domain.
3. Half-duplex Ethernet has lower effective throughput.
4. Half-duplex Ethernet has higher effective throughput.
A.  2 only
B.  1 and 3
C.  2 and 4
D.  4 only
E.  1,2,3&4
View Answer Discuss in Forum
27 .
Mosaic is a
A.  Program language
B.  Operating system
C.  Web browser
D.  Web creator
E.  None of these
View Answer Discuss in Forum
28 .
Ethernet is family of protocol used in
A.  LAN
B.  MAN
C.  WAN
D.  BIOS
E.  None of these
View Answer Discuss in Forum
29 .
When data is encapsulated, which is the correct order?
A.  Data, frame, packet, segment, bit
B.  Data, segment, packet, frame, bit
C.  Segment, data, packet, frame, bit
D.  Data, segment, frame, packet, bit
E.  None of these
View Answer Discuss in Forum
30 .
How to implement a network medium that is not susceptible to EMI. Which type of cabling should you use?
A.  Fiber-optic cables
B.  Category 5 UTP cable
C.  Thinnet coax
D.  Thicknet coax
E.  None of these
View Answer Discuss in Forum

Computer Fundamentals Database Management System


Sponsored Links
500
Write your Comment or Discuss..
    Log in | Sign up

    Copyright 2019-2020 | Privacy Policy | Terms and Conditions | Contact us | Advertise