A:-4
B:-6
C:-7
D:-8
Correct Answer:- Option-D
2:-Which of the following is a private network?
A:-LAN
B:-WAN
C:-MAN
D:-None of the above
B:-6
C:-7
D:-8
Correct Answer:- Option-D
2:-Which of the following is a private network?
A:-LAN
B:-WAN
C:-MAN
D:-None of the above
Correct Answer:- Option-A
3:-The IEEE standard for Wireless LAN is:
3:-The IEEE standard for Wireless LAN is:
A:-IEEE 802.3
B:-IEEE 802.4
C:-IEEE 802.11
D:-IEEE 802.7
Correct Answer:- Option-C
4:-A protocol that allows non-ASCII messages to be sent through e-mails:
B:-IEEE 802.4
C:-IEEE 802.11
D:-IEEE 802.7
Correct Answer:- Option-C
4:-A protocol that allows non-ASCII messages to be sent through e-mails:
A:-MIME
B:-IMAP
B:-IMAP
C:-POP3
D:-SMTP
Correct Answer:- Option-A
Correct Answer:- Option-A
5:-A sniffer is
A:-A protocol
A:-A protocol
B:-A virus
C:-A program that monitors and analyzes network traffic
C:-A program that monitors and analyzes network traffic
D:-None of the above
Correct Answer:- Option-C
6:-Providing, managing and maintaining hardware, software, content integrity, security and reliable high speed connection for a website is called:
A:-Web hosting
Correct Answer:- Option-C
6:-Providing, managing and maintaining hardware, software, content integrity, security and reliable high speed connection for a website is called:
A:-Web hosting
B:-Web Browsing
C:-Web Crawling
D:-Navigation
Correct Answer:- Option-A
7:-The system that helps users to identify host computers in a network by their names instead of their IP addresses is:
A:-TCP
B:-DNS
C:-PPP
D:-ARP
Correct Answer:- Option-B
8:-A computer virus that copies itself to the beginning of the hard disk, where it is automatically executed when the system is turned ON is called
A:-Worm
B:-Trojan Horse
C:-Boot sector virus
Correct Answer:- Option-A
7:-The system that helps users to identify host computers in a network by their names instead of their IP addresses is:
A:-TCP
B:-DNS
C:-PPP
D:-ARP
Correct Answer:- Option-B
8:-A computer virus that copies itself to the beginning of the hard disk, where it is automatically executed when the system is turned ON is called
A:-Worm
B:-Trojan Horse
C:-Boot sector virus
D:-None of the above
Correct Answer:- Option-C
9:-What is a trap door in a program?
A:-A security hole inserted while writing the program, which is intended for later use
Correct Answer:- Option-C
9:-What is a trap door in a program?
A:-A security hole inserted while writing the program, which is intended for later use
B:-An error in the program
C:-Security hole in a network
C:-Security hole in a network
D:-None of the above
Correct Answer:- Option-A
10:-Honeypot is an example for
10:-Honeypot is an example for
A:-Security auditing software
B:-Intrusion detection software
B:-Intrusion detection software
C:-Encryption software
D:-Virus
Correct Answer:- Option-B
D:-Virus
Correct Answer:- Option-B
1 Comments
nice to you thanks
ReplyDeletePost a Comment