Download as pdf or txt
Download as pdf or txt
You are on page 1of 32

Q1) You want to create a standard access list that denies the subnet of

the following host: 172.16.50.172/20 . Which of the following would you


start your list with ?
A. access-list 10 deny 172.16.48.0 255.255.240.0
B. access-list 10 deny 172.16.0.0 0.0.255.255
C. access-list 10 deny 172.16.64.0 0.0.31.255
D. access-list 10 deny 172.16.48.0 0.0.15.255
Answer : Option D

Q2) What router command allows you to dertermine whether an IP access


list is enabled on a particular interface ?
A. show ip port
B. show access-lists
C. show ip interface
D. show access-lists interface
Answer : Option C

Q3) In the SSLv3 the padding bits are ____________ with the secret key.
A. Padded
B. XORed
C. Concatenated
D. ANDed
Answer : Option C

Q4) How many processes are there for changing a plaintext piece of data
into encrypted data in AES - 128?
A. 14
B. 8
C. 1
2
D. 1
0
Answer : Option D

Q5) Which of the following cloud service providers does not provide
Hybrid Storage?
A.All of the mentioned options
B.AWS
C.Azure
D.Google Cloud
Answer : Option D

Q6) Which of the following cloud service providers should be preferred if


most of your data is of Binary large objects type?
A.Oracle
B.Azure
C.Google Cloud Platform
D.AWS
Answer : Option B
Q7) Consider a situation where you have to choose between the major cloud
service providers. Which would you choose if you want support for Linux,
Windows Server, and SQL Server and enhanced security?
A.Oracle
B.Google Cloud
C.Alibaba Cloud
D.Azure
Answer : Option D

Q8) Which is not an objective of network security?


A. Identification
B. Authentication
C. lock
D. Access Control
Ans: C

Q9) An algorithm in encryption is called _____________


A. Algorithm
B. Procedure
C. Module
D. Cipher
Ans: D

Q10) What is ransomware?


A. A nickname for the types of spyware that require a password on boot.
B. software that steals files from your computer and is used by
blackmailers.
C. A software that hijacks your computer and asks you to pay in order for
it to be removed.
D. viruses that infect files and won't let you open them unless you know
a certain passcode.
Ans: C
Q1) You are working on a router that has established privilege levels that restric access to
certain functions. You discover that you are not able to execute the command show
running-configuration. How can you view and confirm that the access list that have been apllied
to the Ethernet 0 interface on your router?
A. show access-lists
B. show interface Ethernet 0
C. show ip access-lists
D. show ip interface Ethernet 0
Answer : Option D

Q2) What command will permit SMTP mail to only host 1.1.1.1 ?
A. access-list 10 permit smtp host 1.1.1.1
B. access-list 110 permit ip smtp host 1.1.1.1
C. access-list 10 permit tcp any host 1.1.1.1 eq smtp
D. access-list 110 permit tcp any host 1.1.1.1 eq smtp
Answer : Option D

Q3) Antivirus scanning devices fall under which type of network security device?
A.Active devices
B.Preventative devices
C.Unified Threat Management devices
D.Passive devices
Answer : Option A

Q4) Which of the following is the correctly mapped relationship between attributes and cloud or
data centre?
A.In house IT professionals: Data center, Co-location makes failures dependent: cloud
B.Instant Scalable: Data Center, Pay as per use: cloud
C.On-premises: Data center, Remote Hardware: Cloud
D.Involves challenges and delay in Scalability: Data Center, Remote Hardware: Cloud
Answer : Option C

Q5) Consider a situation when you have to choose between the major cloud service providers.
Which would you choose if you need a cloud service if you do not want to have backup support?
A.AWS
B.Oracle
C.Azure
D.Google Cloud
Answer : Option D

Q6) Which of the following types of network security ensures that potential attackers cannot
infiltrate your network?
A.Firewall
B.Network Access Control
C.Virtual Private Network
D.Both Network Access Control and Virtual Private Network
Answer : Option C

Q7) An attack in which the user receives an unwanted amount of emails is .


A.Smurfing
B.Denial of Service
C.E-mail bombing
D.Ping storm
Answer : Option C

Q8) Attack in which a user creates a packet that appears to be something else is .
A.Smurfing
B.Trojan
C.E-mail bombing
D.Spoofing
Answer : Option D

Q9) Which of the following statements is true about cloud and data center?
I.In Cloud, owner is responsible for downtime and repairs
II.In Data center, owner is responsible for downtime and repairs
Choose the correct answer from the options given below.
A.Neither 1 nor 2
B.Only 2
C.Only 3
D.Both 1 and 2
Answer : Option B

Q10) DES Encryption algorithm is an example of which of the following options?


A.Bit-oriented cipher
B.All of the mentioned options
C.Byte-oriented cipher
D.Key-alternating block ciphers
Answer : Option A
1. What does IP Security (IPsec) primarily aim to achieve?
a) Data compression
b) Data encryption
c) Data authentication
d) Data routing
COrrect C

2. Which IPsec component provides data confidentiality?


a) Authentication header
b) Encapsulating security payload
c) Key management
d) Combining security associations

COrrect B

3. What is the purpose of the Authentication Header (AH) in IPsec?


a) Confidentiality
b) Authentication and integrity
c) Key exchange
d) Data compression

COrrect B

4. Which IPsec component ensures the integrity and authenticity of the data being transmitted?
a) Authentication header
b) Encapsulating security payload
c) Combining security associations
d) Key management

COrrect A

5. Which protocol is commonly used for key management in IPsec?


a) FTP
b) SSH
c) IKE
d) HTTP

COrrect C

6. Secure Socket Layer (SSL) is commonly used for securing which type of communication?
a) Email
b) Web
c) Voice
d) File sharing

COrrect B

7. Which of the following is a widely used secure electronic transaction protocol for online
payments?
a) HTTPS
b) SET
c) VPN
d) SSH

COrrect B

8. What is the primary goal of an Intrusion Detection System (IDS)?


a) To prevent intrusions
b) To detect and respond to intrusions
c) To encrypt data
d) To manage keys

COrrect B
9. Which type of security threat is typically characterized by self-replicating malicious code?
a) Intrusion
b) Virus
c) Firewall
d) Authentication
COrrect B

10. What is the primary function of a firewall in network security?


a) Data encryption
b) Virus detection
c) Unauthorized access prevention
d) Data compression

COrrect B
1. The combination of two or more interconnected networks is called

a) Internetwork
b) LAN
c) MAN
d) WAN

Ans: a

2. National Internet Service Provider (ISP) networks are connected to one another by private
switching network is called

a) Peering Points
b) Network Access Points
c) National ISP
d) None of these

Ans: b

3. The network that provides high-speed connectivity or transmission speed is

a) MAN
b) LAN
c) WAN
d) Internetwork
Ans: b

4. The method of communication in which transmission of data takes place in both directions but
in one direction at a time is

a) Simplex
b) Four-wire circuit
c) Half-duplex
d) Full duplex
Answer: C

5. A set of internetworking protocol that allows communication across multiple diverse networks
is known as

a) TCP
b) IP
c) ISP
d) TCP/IP
Ans: d

6. What is Cloud Computing replacing?


A. Corporate data centers
B. Expensive personal computer hardware
C. Expensive software upgrades
D. All of the above
Ans: D

7. Which of these is not a major type of cloud computing usage?


A. Hardware as a Service
B. Platform as a Service
C. Software as a Service
D. Infrastructure as a Service
Ans: A

8. “Cloud” in cloud computing represents what?


A. Wireless
B. Hard drives
C. People
D. Internet
Ans: D

9. Which of these should a company consider before implementing cloud computing


technology?
A. Employee satisfaction
B. Potential cost reduction
C. Information sensitivity
D. All of the above
Ans: D

10. What exactly is cloud computing?


A. A way to organize desktop computers
B. Lightweight software that takes up little space on a hard drive
C. Computing resources that can be accessed on demand, like electricity from a utility
D. The World Wide Web
Ans: C
1. Identify the protocol primarily used for browsing data.
A. FTP
B. TCP
C. HTTP
D. TFTP

Ans: C

2. Coding schemes can be divided into two broad categories ________


A) Block Coding and Convolution Coding.
B) Hamming coding and convolution coding
C) character coding, integer coding
D) hamming coding and block coding
Ans A

3. Identify the first network which was based on TCP/IP protocol.


A.ARPANET
B.HUB
C.ERNET
D.ETHERENET
Ans A

4. Which of the following layer isn’t present in the TCP/IP model but is included in the OSI
model?
A.Network layer
B.session layer
C.transport layer
D.application layer
Ans B

5. What is the location of a resource on the internet given by?


A.Email
B.IP
C.Protocol
D.URL
Ans: D

6. Which of these techniques is vital for creating cloud-computing centers?

A. Virtualization
B. Transubstantiation
C. Cannibalization
D. Insubordination
Ans: A

7. An internal cloud is…


A. An overhanging threat
B. A career risk for a CIO
C. A cloud that sits behind a corporate firewall
D. The group of knowledge workers who use a social network for water-cooler gossip
Answer: C

8. Cloud computing embraces many concepts that were previously touted as the next big thing
in information technology. Which of these is not an antecedent of the cloud?
A. Software as a service
B. Utility computing
C. Remote hosted services
D. Grid computing
E. Desktop computing
Answer: E

9. IBM, EMC and Boeing Co. were among the companies signing what document whose title is
reminiscent of a famous political statement?
A. Declaration of Cloud Computing
B. The Rights of Cloud
C. Mein Cloud
D. Open Cloud Manifesto
Answer: D

10. The term “cloud computing” is a metaphor that originated in what?


A. Graphical depiction of computer architectures
B. Meteorological symbolism
C. Worries about an unclear future for computing architectures
D. The idea that computer users trust in magic
Answer: A
1. What is the term for a cyber-security attack that targets multiple interconnected devices
simultaneously to create a large- scale attack network?
a. DDoS attack
b. Botnet attack
c. Zero-day attack
d. Spear phishing attack
Ans: b

2. Which of the following statement is/are FALSE?


(i) A firewall acts as a packet filter inspecting all the packets entering the local network.
(ii) Digital signatures do not provide nonrepudiation.
(iii) Asymmetric cryptography uses both public and private keys.
a. Only (ii) and (iii)
b. Only (ii)
c. Only (i) and (iii)
d. Only (iii)
e. None of the above
Ans: b

3. Which of the following statements is true about modems?


a. Modems use the telephone lines
b. Modem stands for modulator and demodulator
c. Modem are no longer used in secure network
d. Both a and b
e. None of the above
Ans: d

4. Which of the following statement is False?


a. Packet switching leads to better utilization of bandwidth resources than circuit switching.
b. Packet switching results in less variation in the delay than circuit switching.
c. Packet switching sender and receiver can use any bit rate, format or framing method unlike
circuit switching.
d. Packet switching can lead to reordering unlike circuit switching.
e. None of the above
Ans: b

5. Which of the following statement is correct about Wi-Fi and Li-Fi?


I. Wi-Fi uses light emitting diodes for data transmission.
II. Li- Fi works very well in dense environment.
III. In Li-Fi, data transfer speed is about 1 Gbps.

a. I
b. II
c. I and II
d. II and III
e. none of the above
Ans: d

6. Cloud computing is a ..............


A. reliable system
B. stateless system
C. stateful system
D. None of the above
Ans: B

7. Which option is related to service provided by Cloud ?


A. AaaS
B. Reliability
C. Sourcing
D. Ownership
Ans: C

5. Websocket protocol uses which communication model


A. Publish-Subscribe
B. Request-Response
C. Push-Pull
D. Exclusive pair

Answer A

9. Which of the following is not a cloud storage?


a. Hard disks
b. Xdrive
c. MediaMax
d. Strongspace
Ans : a

10. Which of the following service provider provides the least amount of built-in security?
a. Platform as a service
b.Infrastructure as a service
c. Software as a service
d. All of the above
Ans: b
1. In computing, ________ is a network security system that monitors and controls incoming
and outgoing network traffic based on predetermined security rules.
a. Spyware
b. cookie
c. spam
d. firewall
Ans: d

2. Which among the following network topologies has the highest transmission speed?
a. LAN
b. WAN
c. MAN
d. Both LAN and WAN have equal transmission speeds.

Ans: a

3. IPv6 addresses have a size of:


a. 64 bits
b. 128 bits
c. 256 bits
d. 512 bits
Ans: b

4. Which of the following device is used to connect similar LAN with same protocols?
a. Gateways
b. Routers
c. Switches
d. Bridges
Ans: d

5. Which of the following statements is true for network hub?


a. A hub connects different stations in a private network.
b. It sends data packets to the intended recipient.
c. It contains two ports: one for input and other for output.
d. It works at the network layer.
Ans: a

6. Which resources are typically provided by an Infrastructure as a Service cloud computing


delivery
model?
A. applications
B. virtual machines
C. virtual private networks
D. middleware software stacks
Ans: B

7. Which statement best describes the relationship between application, server, and client in a
multitenancy
environment?
A. Single instance of software running on a server and serves one client.
B. Single instance of software running on a server and serves multiple clients.
C. Multiple instances of software running on a server and serves multiple clients.
D. Multiple instances of software running on multiple servers and serves one client.
Answer: B

8. Which concept aligns business and IT assets, helps provide flexible IT capacity, and provides
real
time allocation of IT resources in line with demand from business processes?
A. elasticity
B. virtualization
C. dynamic infrastructure
D. automated management of resources
Ans: C

9. An enterprise needs highly controlled storage and access to their databases as well as
managing the
infrastructure for web front ends and other applications. They have a large existing IT
infrastructure
and they are continually expanding the capabilities. Which cloud computing model will satisfy all
their current needs and enable them to reduce cost?
A. public cloud
B. hybrid cloud
C. private cloud
D. internal cloud
Answer: B

10. A customer is struggling with inconsistent software builds in the testing and staging
environment.
Which cloud attribute can help resolve the problem?
A. pervasiveness
B. elastic scaling
C. flexible pricing
D. automatic provisioning
Answer: D
1. Which among the following protocols is known as the terminal emulation protocol?
a. HTTP
b. FTP
c. SMTP
d. TELNET
Ans: d

2. Which of the following internet service is appropriate to access the computer of your office
from home?
a. www
b. IRC
c. FTP
d. Telnet
Ans: d

3. The loss in signal power as light travels down the fiber is called .............
A) Attenuation
B) Propagation
C) Scattering
D) Interruption
Ans: A

4. Which of the following TCP/IP protocols is used for transferring files form one machine to
another. A) FTP
B) SNMP
C) SMTP
D) RPC
Ans: A

5. DNS can obtain the ................. of host if its domain name is known and vice versa.
A) Station address
B) IP address
C) Port address
D) Checksum
Ans: B

6. A company needs to provide IT services to a worldwide customer base utilizing a diverse set
of
devices. Which attribute of cloud computing can help the company deliver such services?
A. pervasiveness
B. flexible pricing
C. vertical scaling of application servers
D. horizontal scaling of application servers
Answer: A

7. What advantage is there for an enterprise to adopt a virtual private cloud model?
A. Reduce costs by adopting a flexible pricing model for the entire operation.
B. Reduce infrastructure costs since all data centers will be managed in a third party cloud.
C. Manage sensitive data in a compliant and secure manner and benefit from flexible pricing
models
for select services or infrastructure.
D. Obtain maximum control over aspects such as security and performance since the entire
infrastructure will be managed within the IT department.
Answer: C

8. A company is considering a cloud environment to improve the operating efficiency for their
data and
applications. The company is part of an industry where strict security and data privacy issues
are of
the highest importance. Which type of cloud would be a good choice?
A. hybrid cloud
B. public cloud
C. private cloud
D. governed cloud
Answer: C

9. A company has decided to leverage the web conferencing services provided by a cloud
provider and
to pay for those services as they are used. The cloud provider manages the infrastructure and
any
application upgrades. This is an example of what type of cloud delivery model?
A. Platform as a Service
B. Software as a Service
C. Application as a Service
D. Infrastructure as a Service
Answer: B

10. Which delivery model is an example of a cloud computing environment that provides users
with a
web based email
service?
A. Software as a Service
B. Platform as a Service
C. Computing as a Service
D. Infrastructure as a Service
Answer: A
1. Which virtualization standard does the WebSphere Application Server Hypervisor Edition
use?
A. Common Image Format
B. Open Virtual Appliance
C. Open Virtualization Format
D. Interoperable Image Format
Answer: C

2. What are the common set of technologies used to create a manageable cloud environment?
A. A hypervisor and a hypervisor manager like Virtual Center or VMControl.
B. A hypervisor, a hypervisor manager, automated provisioning, and monitoring.
C. A hypervisor, a hypervisor manager, a self service portal, automated provisioning, and
monitoring.
D. A hypervisor, a hypervisor manager, self service portal, and an automated provisioning tool
like
IBM Tivoli Provisioning Manager.
Answer: C

3. Cloud service providers typically provide web based management consoles that provide
users insight
on the state of cloud services. What is one technology used in client side browser code that
queries
back end systems for data from the cloud services?
A. PHP
B. AJAX
C. HTML
D. XHTML
Ans: B

4. How do users access Software as a Service cloud services?


A. thick client
B. local client
C. web browser
D. command line
Answer: C

5. Data center clouds are formed by connecting two or more data center cloud networks over
wide
area network. When building such data center clouds, which component is mainly responsible
for
increasing the network latency?
A. network servers
B. network clients
C. network interfaces
D. network routing protocols
Ans: C

6. …………… is to protect data and passwords.


A) Encryption
B) Authentication
C) Authorization
D) Non-repudiation
Ans: A

7. The ……………… layer is responsible for resolving access to the shared media or resources.
A) Physical
B) Mac sub layer
C) Network
D) Transport
Ans: B

8. The examples of Interior Gateway Protocols (IGP) are.


i) Open Short Path First (OSPF) ii) Routing Information Protocol (RIP)
iii) Border Gateway Protocol (BGP)
A) i only
B) i, and ii only
C) i and iii only
D) All i, ii and iii
Ans: B

9. Which of the following is not a mechanism that DHCP supports for IP address allocation?
A) Automatic allocation
B) Static allocation
C) Dynamic allocation
D) Manual allocation
Ans: B

10. State whether true or false.


i) A connection oriented protocol can only use unicast addresses.
ii) The anycast service is included in IPV6.
A) True, True
B) True, False
C) False, True
D) False, False
Ans: A
1. Which approach is generally considered the easiest when beginning to adopt a cloud
computing
deployment model?
A. Trying it out in a testing environment.
B. Trying it out in a staging environment.
C. Trying it out at the beginning of a new project.
D. Trying it out directly in a production environment.
Answer: A

2. What type of hypervisor provides the highest efficiency and performance?


A. utility based
B. storage based
C. software based
D. firmware based
Ans. D

3. What is used to logically assign and separate physical resources such as memory and CPU
in a cloud
computing model?
A. bios
B. a hypervisor
C. a load balancer
D. a blade chassis
Answer: B

4. Software as a Service is considered to be included in which cloud computing layer?


A. Data
B. Client
C. Application
D. Infrastructure
Answer: C

5. What are the components of a cloud computing environment?


A. application, platform, infrastructure
B. client, application, session, network, data
C. application, presentation, transport, network, data
D. client, application, platform, infrastructure, server
Answer: D

6. What is a common trait of cloud architectures?


A. It dictates monolithic application designs.
B. It must use publicly accessible computing resources.
C. A fixed set of computing resources is preallocated
to each application.
D. While in operation the application automatically scales up or down based on resource needs.
Answer: D

7. State whether the following statement are true.


i) An application-level gateway is often referred to as a proxy.
ii) In proxy, a direct connection is established between the client and destination server.
A) True, False
B) False, True
C) True, True
D) False, False
Ans: A

8. The primary goal of the ………………….. protocol is to provide a private channel between
communicating application, which ensures privacy of data authentication of the partners, and
integrity.
A) SSL
B) ESP
C) TSL
D) PSL
Ans: A

9. In ………………. Mode, the authentication header is inserted immediately after the IP header.
A) Tunnel
B) Transport
C) Authentication
D) Both A and B
Ans: A

10. A firewall is installed at the point where the secure internal network and untrusted external
network meet which is also known as ………………
A) Chocke point
B) meeting point
C) firewall point
D) secure point
Ans: A
1. What type of hypervisor provides the highest efficiency and performance?
A. utility based
B. storage based
C. software based
D. firmware based
Ans. D

2. Cloud service providers typically provide web based management consoles that provide
users insight
on the state of cloud services. What is one technology used in client side browser code that
queries
back end systems for data from the cloud services?
A. PHP
B. AJAX
C. HTML
D. XHTML
Ans: B

3. How do users access Software as a Service cloud services?


A. thick client
B. local client
C. web browser
D. command line
Answer: C

4.In the SSLv3 the padding bits are ____________ with the secret key.
A. Padded
B. XORed
C. Concatenated
D. ANDed
Answer : Option C

5.Antivirus scanning devices fall under which type of network security device?
A.Active devices
B.Preventative devices
C.Unified Threat Management devices
D.Passive devices
Answer : Option A

6.What is the purpose of the Authentication Header (AH) in IPsec?


a) Confidentiality
b) Authentication and integrity
c) Key exchange
d) Data compression

COrrect B

7. A set of internetworking protocol that allows communication across multiple diverse networks
is known as

a) TCP
b) IP
c) ISP
d) TCP/IP

Ans: d

8. Coding schemes can be divided into two broad categories ________


A) Block Coding and Convolution Coding.
B) Hamming coding and convolution coding
C) character coding, integer coding
D) hamming coding and block coding
Ans A

9. Which of the following statements is true about modems?


a. Modems use the telephone lines
b. Modem stands for modulator and demodulator
c. Modem are no longer used in secure network
d. Both a and b
e. None of the above
Ans: d

10. Which among the following network topologies has the highest transmission speed?
a. LAN
b. WAN
c. MAN
d. Both LAN and WAN have equal transmission speeds.

Ans: a
31 Correct Ans : D Added By : fc15074 October 17, 2023, 2:14 pm Edit
What type of hypervisor provides the highest efficiency and performance?
A. utility based
B. storage based
C. software based
D. firmware based

32 Correct Ans : B Added By : fc15074 October 17, 2023, 2:14 pm Edit


Cloud service providers typically provide web based management consoles that provide users
insight
on the state of cloud services. What is one technology used in client side browser code that
queries
back end systems for data from the cloud services?
A. PHP
B. AJAX
C. HTML
D. XHTML

33 Correct Ans : C Added By : fc15074 October 17, 2023, 2:14 pm Edit


How do users access Software as a Service cloud services?
A. thick client
B. local client
C. web browser
D. command line

34 Correct Ans : C Added By : fc15074 October 17, 2023, 2:15 pm Edit


In the SSLv3 the padding bits are ____________ with the secret key.
A. Padded
B. XORed
C. Concatenated
D. ANDed

35 Correct Ans : A Added By : fc15074 October 17, 2023, 2:15 pm Edit


Antivirus scanning devices fall under which type of network security device?
A.Active devices
B.Preventative devices
C.Unified Threat Management devices
D.Passive devices
36 Correct Ans : B Added By : fc15074 October 17, 2023, 2:15 pm Edit
What is the purpose of the Authentication Header (AH) in IPsec?
a) Confidentiality
b) Authentication and integrity
c) Key exchange
d) Data compression

37 Correct Ans : D Added By : fc15074 October 17, 2023, 2:15 pm Edit


A set of internetworking protocol that allows communication across multiple diverse networks is
known as

a) TCP
b) IP
c) ISP
d) TCP/IP

38 Correct Ans : A Added By : fc15074 October 17, 2023, 2:16 pm Edit


Coding schemes can be divided into two broad categories ________
A) Block Coding and Convolution Coding.
B) Hamming coding and convolution coding
C) character coding, integer coding
D) hamming coding and block coding

39 Correct Ans : D Added By : fc15074 October 17, 2023, 2:16 pm Edit


Which of the following statements is true about modems?
a. Modems use the telephone lines
b. Modem stands for modulator and demodulator
c. Modem are no longer used in secure network
d. Both a and b
e. None of the above

40 Correct Ans : A Added By : fc15074 October 17, 2023, 2:16 pm Edit


Which among the following network topologies has the highest transmission speed?
a. LAN
b. WAN
c. MAN
d. Both LAN and WAN have equal transmission speeds.
1. Frames from one LAN can be transmitted to another LAN via the device
A Router
B Bridge
C Repeater
D Modem
Ans B

2. Which of the following device is used to connect two systems, especially if the systems use
different protocols?
A hub
B bridge
C gateway
D repeater
E None of the above
Ans C

3. The term 'duplex' refers to the ability of the data receiving stations to echo back a confirming
message to the sender. In full duplex data transmission, both the sender and the receiver
A cannot talk at once
B can receive and send data simultaneously
C can send or receive data one at a time
D can do one way data transmission only
E. None of the above
Answer: Option B

4. ICMP (Internet Control Message Protocol) is


A. a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical
hardware
address
B. a TCP/IP high level protocol for transferring files from one machine to another
C. a protocol used to monitor computers
D. a protocol that handles error and control messages
E. None of the above
Answer: Option D

5. Which is the main function of transport layer?


A) Node to node delivery
B) End to end delivery
C) Synchronization
d) Updating and maintaining routing tables
Ans B
6. What type of hypervisor provides the highest efficiency and performance?
A. utility based
B. storage based
C. software based
D. firmware based
Ans. D

7. What is the disadvantage of cloud computing?


A. Limited Control
B. Excellent accessibility
C. Unlimited storage capacity
D. Low maintenance cost
Ans: A

8. What are the security risks of cloud computing?


A. Compliance violations
B. Identity theft
C. Unauthorized Access
D. All of the above
Ans: D

9. .............. gives statistical information on different search terms.


A. Tool
B. Stats
C. Trends
D. None of above
Ans: C

10. ................ is a more sophisticated load balancer.


A. workload managers
B. rackserve managers
C. workspace managers
D. None of above
Ans: A
1. What does IP Security (IPsec) primarily aim to achieve?
a) Data compression
b) Data encryption
c) Data authentication
d) Data routing
C

2. Which IPsec component provides data confidentiality?


a) Authentication header
b) Encapsulating security payload
c) Key management
d) Combining security associations
B

3. What is the purpose of the Authentication Header (AH) in IPsec?


a) Confidentiality
b) Authentication and integrity
c) Key exchange
d) Data compression
B

4. Which IPsec component ensures the integrity and authenticity of the data being transmitted?
a) Authentication header
b) Encapsulating security payload
c) Combining security associations
d) Key management
A

5. Which protocol is commonly used for key management in IPsec?


a) FTP
b) SSH
c) IKE
d) HTTP
C

You want to create a standard access list that denies the subnet of the following host:
172.16.50.172/20 . Which of the following would you start your list with ?
A. access-list 10 deny 172.16.48.0 255.255.240.0
B. access-list 10 deny 172.16.0.0 0.0.255.255
C. access-list 10 deny 172.16.64.0 0.0.31.255
D. access-list 10 deny 172.16.48.0 0.0.15.255
Answer : Option D
You are working on a router that has established privilege levels that restric access to certain
functions. You discover that you are not able to execute the command show
running-configuration. How can you view and confirm that the access list that have been apllied
to the Ethernet 0 interface on your router?
A. show access-lists
B. show interface Ethernet 0
C. show ip access-lists
D. show ip interface Ethernet 0
Answer : Option D

What does IP Security (IPsec) primarily aim to achieve?


a) Data compression
b) Data encryption
c) Data authentication
d) Data routing
COrrect C

The combination of two or more interconnected networks is called

a) Internetwork
b) LAN
c) MAN
d) WAN

Ans: a

Identify the protocol primarily used for browsing data.


A. FTP
B. TCP
C. HTTP
D. TFTP

Ans: C
Secure Socket Layer (SSL) is commonly used for securing which type of communication?
a) Email
b) Web
c) Voice
d) File sharing
Ans: b

Which SSL/TLS protocol layer is responsible for encrypting data transmission?


a) Handshake
b) Record
c) Alert
d) Change Cipher Spec
ans: B

Which of the following is a widely used secure electronic transaction protocol for online
payments?
a) HTTPS
b) SET
c) VPN
d) SSH
ans: b

What is the primary goal of an Intrusion Detection System (IDS)?


a) To prevent intrusions
b) To detect and respond to intrusions
c) To encrypt data
d) To manage keys
ans:b

Which type of security threat is typically characterized by self-replicating malicious code?


a) Intrusion
b) Virus
c) Firewall
d) Authentication
ans B

What router command allows you to dertermine whether an IP access list is enabled on a
particular interface ?
A. show ip port
B. show access-lists
C. show ip interface
D. show access-lists interface
Answer : Option C
What command will permit SMTP mail to only host 1.1.1.1 ?
A. access-list 10 permit smtp host 1.1.1.1
B. access-list 110 permit ip smtp host 1.1.1.1
C. access-list 10 permit tcp any host 1.1.1.1 eq smtp
D. access-list 110 permit tcp any host 1.1.1.1 eq smtp
Answer : Option D

Which IPsec component provides data confidentiality?


a) Authentication header
b) Encapsulating security payload
c) Key management
d) Combining security associations

COrrect B

National Internet Service Provider (ISP) networks are connected to one another by private
switching network is called

a) Peering Points
b) Network Access Points
c) National ISP
d) None of these

Ans: b

Coding schemes can be divided into two broad categories ________


A) Block Coding and Convolution Coding.
B) Hamming coding and convolution coding
C) character coding, integer coding
D) hamming coding and block coding
Ans A

You might also like