Data communication and networking Practice Question and Answer
8 Q: Junk e-mail is called:
239 064a540acb394764d11b18bdf
64a540acb394764d11b18bdf- 1Spamtrue
- 2Spooffalse
- 3Sniffer scriptfalse
- 4Spoolfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Spam"
Explanation :
1. Junk email is called spam. Spam is an email that you did not request, and which usually promotes advertising or other unwanted content.
2. Spoofing is a special type of cyber-attack in which someone attempts to deceive other computer networks by using a computer, device, or network to identify themselves as a legitimate entity.
Q: The full name of FTP is:
249 064a52ef89a74b54cff5823ad
64a52ef89a74b54cff5823ad- 1File Transfer Protocoltrue
- 2Fast Trans Travel Protocolfalse
- 3File Tracking Protocolfalse
- 4File transfer processfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "File Transfer Protocol"
Explanation :
1. The full name of FTP is File Transfer Protocol.
2. It is a network protocol used to transfer files between two computers.
3. FTP is a two-way protocol, which means both computers can send and receive files from each other.
4. FTP runs in two main modes-
- Unprotected Mode: This mode transfers files without any protection.
- Secure Mode: This mode uses encryption to transfer files using SSL or TLS.
Q: How many Pins are there in VGA Cable?
270 064942bfd13e8bde03235b582
64942bfd13e8bde03235b582- 111false
- 212false
- 317false
- 4None of thesetrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "None of these"
Explanation :
1. There are two types of VGA cables: 14-pin and 15-pin. 14-pin cables will work in most applications, but wider display compatibility may require a 15-pin cable.
Q: Which of the following methods is used to secure and protect sensitive data on computer systems?
256 06493fcedab3c5fffc2cc5018
6493fcedab3c5fffc2cc5018- 1encryptiontrue
- 2Defragmentationfalse
- 3Formattingfalse
- 4rebootingfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "encryption"
Explanation :
1. Encryption is the process of encoding data in cryptography.
2. This process transforms the plaintext or original representation of data into ciphertext or alternative representation of the data.
3. Only authorized parties should be able to decipher the ciphertext back into plaintext and access the original data.
4. Encryption in itself does not prevent interference, but it hinders interceptors from deciphering the content.
Q: Which of the following statements are true for firewalls?
425 1640081f535d86258eccefcc8
640081f535d86258eccefcc8- 1filtering network trafficfalse
- 2hardware and software securityfalse
- 3follow the rulesfalse
- 4all of the abovetrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "all of the above"
Q: Which statement is true for Router and Wretch?
314 063edfee03c221e1b4dd138d6
63edfee03c221e1b4dd138d6- 1Wretch connects two networks at data link layerfalse
- 2Router is more usefulfalse
- 3Router connects two networks at the Network Layer.false
- 4both (a) and (c)true
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "both (a) and (c)"
Q: Which of the following is the most difficult and secure device that LAN uses?
511 063e62e47cc37d41b3f99ce68
63e62e47cc37d41b3f99ce68- 1static routertrue
- 2IP Enabled Routerfalse
- 3dynamic routerfalse
- 4RIP enabled routerfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "static router"
Q: The company has a large network which is divided into smaller parts. By using which device LAN can be divided into different parts?
382 063e62de99353301b5ccd84f8
63e62de99353301b5ccd84f8- 1an internal firewallfalse
- 2router between subnetsfalse
- 3individual switch for departmentfalse
- 4all of the abovetrue
- Show AnswerHide Answer
- Workspace
- SingleChoice