Q1. Which of the following
topologies provides a highly fault-tolerant architecture?
topologies provides a highly fault-tolerant architecture?
(a) Star
(b) Bus
(c) Ring
(d) Mesh
(e) Tree
Q2. Which of the following
statements is incorrect for TELNET?
statements is incorrect for TELNET?
(a) It is an application layer
protocol.
protocol.
(b) It does not provide security
on its own.
on its own.
(c) It provides encryption
feature.
feature.
(d) It provides bidirectional
text-oriented communication
text-oriented communication
(e) None of these
Q3. Which of the following
techniques is used by unethical hackers to certify fake data over the data over
the Internet for stealing confidential information?
techniques is used by unethical hackers to certify fake data over the data over
the Internet for stealing confidential information?
(a) Phishing
(b) Spear Phishing
(c) Logic Bomb
(d) Spoofing
(e) Cracking
Q4._______ ensures secure
transfer of data over an unsecured network, such as the Internet.
transfer of data over an unsecured network, such as the Internet.
(a) Antivirus
(b) Hacking
(c) Cracking
(d) Spoofing
(e) Cryptography
Q5. Which of the following is/are
the benefits of subnetting?
the benefits of subnetting?
(a) Preservation of address space
(b) Reduced network traffic
(c) Better security
(d) Enhanced performance
(e) All of these
Q6. Which of the following
techniques minimizes the interference between wireless devices?
techniques minimizes the interference between wireless devices?
(a) FCS
(b) RTFS
(c) HCFS
(d) FSSH
(e) FHSS
Q7. Software that gathers
confidential information of a person without his or her permission and sends
that information to another person is called?
confidential information of a person without his or her permission and sends
that information to another person is called?
(a) Antivirus
(b) Spyware
(c) Spam
(d) Trojan Horse
(e) Adware
Q8.Which of the following models
does the working of Bluetooth devices depend?
does the working of Bluetooth devices depend?
(a) Client/Server
(b) LAN
(c) Master/Slave
(d) Analog/Digital
(e) None of these
Q9. How many IP addresses would
be there in a block containing the mask /28?
be there in a block containing the mask /28?
(a) 16
(b) 32
(c) 64
(d) 128
(e) 256
Q10. Which protocol does ping,
the computer network administration software utility use?
the computer network administration software utility use?
(a) TCP
(b) ARP
(c) Telnet
(d) ICMP
(e) BootIP