Data communication and networking Practice Question and Answer

Q:

Junk e-mail is called:

239 0

  • 1
    Spam
    Correct
    Wrong
  • 2
    Spoof
    Correct
    Wrong
  • 3
    Sniffer script
    Correct
    Wrong
  • 4
    Spool
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "Spam"
Explanation :

1. Junk email is called spam. Spam is an email that you did not request, and which usually promotes advertising or other unwanted content.

2. Spoofing is a special type of cyber-attack in which someone attempts to deceive other computer networks by using a computer, device, or network to identify themselves as a legitimate entity.

Q:

The full name of FTP is:

249 0

  • 1
    File Transfer Protocol
    Correct
    Wrong
  • 2
    Fast Trans Travel Protocol
    Correct
    Wrong
  • 3
    File Tracking Protocol
    Correct
    Wrong
  • 4
    File transfer process
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "File Transfer Protocol"
Explanation :

1. The full name of FTP is File Transfer Protocol.

2. It is a network protocol used to transfer files between two computers.

3. FTP is a two-way protocol, which means both computers can send and receive files from each other.

4. FTP runs in two main modes-

- Unprotected Mode: This mode transfers files without any protection.

- Secure Mode: This mode uses encryption to transfer files using SSL or TLS.

Q:

How many Pins are there in VGA Cable?

270 0

  • 1
    11
    Correct
    Wrong
  • 2
    12
    Correct
    Wrong
  • 3
    17
    Correct
    Wrong
  • 4
    None of these
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "None of these"
Explanation :

1. There are two types of VGA cables: 14-pin and 15-pin. 14-pin cables will work in most applications, but wider display compatibility may require a 15-pin cable.

Q:

Which of the following methods is used to secure and protect sensitive data on computer systems?

256 0

  • 1
    encryption
    Correct
    Wrong
  • 2
    Defragmentation
    Correct
    Wrong
  • 3
    Formatting
    Correct
    Wrong
  • 4
    rebooting
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "encryption"
Explanation :

1. Encryption is the process of encoding data in cryptography.

2. This process transforms the plaintext or original representation of data into ciphertext or alternative representation of the data.

3. Only authorized parties should be able to decipher the ciphertext back into plaintext and access the original data.

4. Encryption in itself does not prevent interference, but it hinders interceptors from deciphering the content.

Q:

Which of the following statements are true for firewalls?

425 1

  • 1
    filtering network traffic
    Correct
    Wrong
  • 2
    hardware and software security
    Correct
    Wrong
  • 3
    follow the rules
    Correct
    Wrong
  • 4
    all of the above
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "all of the above"

Q:

Which statement is true for Router and Wretch?

314 0

  • 1
    Wretch connects two networks at data link layer
    Correct
    Wrong
  • 2
    Router is more useful
    Correct
    Wrong
  • 3
    Router connects two networks at the Network Layer.
    Correct
    Wrong
  • 4
    both (a) and (c)
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "both (a) and (c)"

Q:

Which of the following is the most difficult and secure device that LAN uses?

511 0

  • 1
    static router
    Correct
    Wrong
  • 2
    IP Enabled Router
    Correct
    Wrong
  • 3
    dynamic router
    Correct
    Wrong
  • 4
    RIP enabled router
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "static router"

Q:

The company has a large network which is divided into smaller parts. By using which device LAN can be divided into different parts?

382 0

  • 1
    an internal firewall
    Correct
    Wrong
  • 2
    router between subnets
    Correct
    Wrong
  • 3
    individual switch for department
    Correct
    Wrong
  • 4
    all of the above
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "all of the above"

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully