Q.1. Which is NOT a good Web security strategy?
1) Restrict access to the Web server; keep a minimum number of ports open
2) Limit the users who can load software, edit or add files
3) Add demo programs, so users can test system without accessing production data
4) Remove unnecessary compilers and interpreters
5) None of these
1) Restrict access to the Web server; keep a minimum number of ports open
2) Limit the users who can load software, edit or add files
3) Add demo programs, so users can test system without accessing production data
4) Remove unnecessary compilers and interpreters
5) None of these
Q.2. The altering of data so that it is not usable unless the changes are undone is _____ .
1) Biometrics
2) Compression
3) Encryption
4) Ergonomics
5) None of these
1) Biometrics
2) Compression
3) Encryption
4) Ergonomics
5) None of these
Q.3. The word FTP stands for ______
1) File Translate Protocol
2) File Transit Protocol
3) File Typing Protocol
4) File Transfer Protocol
5) None of these
1) File Translate Protocol
2) File Transit Protocol
3) File Typing Protocol
4) File Transfer Protocol
5) None of these
Q.4. Voice mail ________ .
1) is the exchange of text messages and computer files transmitted via a communications network such as a local area network or the Internet
2) permits users to converse in real time with each other via the computer while connected to the Internet
3) functions much like an answering machine, allowing callers to leave a voice message for the called party
4) involves using video and computer technology to conduct a meeting between participants at geographically separate locations
5) None of these
1) is the exchange of text messages and computer files transmitted via a communications network such as a local area network or the Internet
2) permits users to converse in real time with each other via the computer while connected to the Internet
3) functions much like an answering machine, allowing callers to leave a voice message for the called party
4) involves using video and computer technology to conduct a meeting between participants at geographically separate locations
5) None of these
Q.5. A communication processor that connects dissimilar networks by providing the translation from one set of protocol to another is _______ .
1) Bridge
2) Gateway
3) Router
4) Modem
5) All of these
1) Bridge
2) Gateway
3) Router
4) Modem
5) All of these
Q.6. The _____ layer is the layer closest to transmission medium.
1) Transport
2) Network
3) Data link
4) Physical
5) None of these
1) Transport
2) Network
3) Data link
4) Physical
5) None of these
Q.7. End to end connectivity is provided from host to host in
1) Network layer
2) Session layer
3) Data link layer
4) Transport layer
5) None of these
1) Network layer
2) Session layer
3) Data link layer
4) Transport layer
5) None of these
Q.8. Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another?
1) SNMP
2) SMTP
3) RPC
4) FTP
5) None of these
1) SNMP
2) SMTP
3) RPC
4) FTP
5) None of these
Q.9. Which of the following is an example of a client-server model?
1) FTP
2) DNS
3) TELNET
4) All of these
5) None of these
1) FTP
2) DNS
3) TELNET
4) All of these
5) None of these
Q.10. Which of the following virus overtake computer system when it boots and destroy information?
1) Trojan
2) System infectors
3) Boot infectors
4) Stealth virus
5) None of these
Answers.
Q.1. 4
1) Trojan
2) System infectors
3) Boot infectors
4) Stealth virus
5) None of these
Answers.
Q.1. 4
Q.2. 3
Q.3. 4
Q.4. 3
Q.5. 2
Q.6. 4
Q.7. 4
Q.8. 2
Q.9. 4
Q.10. 4
No comments:
Post a Comment