online     
Latest GeneralKnowledge and Current Affairs  |   MCQ on General Affairs
News

Monday, November 29, 2010

CA Quiz 2010 - 17

QUIZ ON COMPUTER AWARENESS 2010 – 17

To see correct answer, move mouse over options, answer will be highlighted

1. Which technology allows a user to securely access a company LAN

     across a public network?

      a) MD5    b) TCP     c) SHA    d) VPN    e) None of these

2. Which of algorithms are used for hash encoding to guarantee the integrity

    of data?

    a) MD5    b) SHA    c) SSL   d) VPN    e) Both (a) & (b)

3. Which type of encryption key should be enabled on WPA-compliant

    devices?

     a) 28-bit   b) 32-bit   c) 64-bit    d) 128-bit   e) 256-bit

4. Which standard uses a 64bit and 128bit key to secure Wi-Fi services?

       a) WAP    b) WPA   c) WEP   d) SMS   e) LEAP

5. Which wireless technology offers a maximum data rate of 540 Mbps?

     a) 802.11a   b) 802.11b  c) 802.11g   d) 802.11n   e) None

6.  In WEP standards, the encryption key is

     a) static     b) dynamic   c) a 8-bit word   d) a binary text  e)None

7.  In context of computer networks, what does the term WPA stands for?

     a) Wireless Protocol Access

     b) Wi-Fi Protected Access       

     c) Web Protection Application      

     d) Windows Performance Analyzer

     e) None of the above

8. When installing an access point or wireless adapter in a wireless client, the

     installation program asks you to enter the SSID. In this context what is full

     form of SSID?

     a) Secured Services Identification

     b) Secure Shared Input Device 

     c) Service Set Identifiers

     d) Shared System Identity

     e) None of above

9.  Which authentication technology uses a physical characteristic of the user

      in conjunction with a password?

     a) Smart card  

     b) Key card  

     c) Biometrics

     d) Key fob

     e) None of the above

10. A digital signature is -

      a) a bit string giving identity of a correspondent

      b) a unique identification of a sender

      c) an encrypted signature of a sender 

      d) an authentication of an electronic record by tying it uniquely to
a key only a sender knows


      e) None of above

11. In a WLAN, wireless clients and access points send and receive

      information through the

     a) Wires 

     b) UTP Cables

     c) Radio waves

     d) Sound waves

     e) None of above

12.  A wireless network allows:

      a) Easy set-up of networks in older buildings

      b) Addition of new employees to the existing network

      c) Access to the company network from outside the office

      d) Both (b) & (c)

      e) All (a), (b) & (c)

13.  A network administrator needs to restrict access to the network.

      Which type of firewall allows only those packets that are part of a

      known connection?

     a) Proxy firewall 

     b) Stateful firewall

     c) Packet filter     

     d) Content engine

     e) None of above

14.  Which type of program causes banners and ads to appear on the

      desktop without any user intervention?

      a) Adware 

      b) Spyware  

      c) Stealth virus

      d) Trojan horse

      e) None of the above

15.   In HTTP communications, what role does the web browser play?

      a) As a client

      b) As a server 

      c) As both as a client and server 

      d) Page server

      e) None of above

16.  Which of the following is not found in a URL?

     a) Port    b) Path     c) Post    d) Protocol    e) None of above

17.  Which of the following character combinations are used to separate

      name/value pairs in a HTTP query string?

     a) $ and &

     b) = and &  

     c) / and = 

     d) \ and =   

     e) None of above

18.  SGML stands for

       a) Standard Generalized Markup Language

       b) Structured General Markup Language

       c) Standard Graphics Mapping Language

       d) Standard General Markup Link

       e) None of above

19. Client-side scripting programs are executed by:

     a) the web browser before making a HTTP request.

     b) the web browser after receiving a HTTP response containing HTML.

     c) the web server after generating HTML but before sending a HTTP

         response.

    d) the web server after receiving a HTTP request, but before HTML is

        generated.

     e) None of above

20. Which statement is false?

      a) The default port number for HTTP is 80.

      b) HTTP responses always return HTML.

      c) HTTP is stateless application protocol.

      d) HTTP client and server communicate by sending text messages

      e) None of above

Saturday, November 13, 2010

CA Quiz 2010 - 16




QUIZ ON COMPUTER AWARENESS 2010 – 16

[ Total no. of questions per page is 10/20 ]