| QUIZ ON COMPUTER AWARENESS 2010 – 17 To see correct answer, move mouse over options, answer will be highlighted |
1. Which technology allows a user to securely access a company LAN across a public network? a) MD5 b) TCP c) SHA d) VPN e) None of these 2. Which of algorithms are used for hash encoding to guarantee the integrity of data? a) MD5 b) SHA c) SSL d) VPN e) Both (a) & (b) 3. Which type of encryption key should be enabled on WPA-compliant devices? a) 28-bit b) 32-bit c) 64-bit d) 128-bit e) 256-bit 4. Which standard uses a 64bit and 128bit key to secure Wi-Fi services? a) WAP b) WPA c) WEP d) SMS e) LEAP 5. Which wireless technology offers a maximum data rate of 540 Mbps? a) 802.11a b) 802.11b c) 802.11g d) 802.11n e) None 6. In WEP standards, the encryption key is a) static b) dynamic c) a 8-bit word d) a binary text e)None 7. In context of computer networks, what does the term WPA stands for? a) Wireless Protocol Access b) Wi-Fi Protected Access c) Web Protection Application d) Windows Performance Analyzer e) None of the above 8. When installing an access point or wireless adapter in a wireless client, the installation program asks you to enter the SSID. In this context what is full form of SSID? a) Secured Services Identification b) Secure Shared Input Device c) Service Set Identifiers d) Shared System Identity e) None of above 9. Which authentication technology uses a physical characteristic of the user in conjunction with a password? a) Smart card b) Key card c) Biometrics d) Key fob e) None of the above 10. A digital signature is - a) a bit string giving identity of a correspondent b) a unique identification of a sender c) an encrypted signature of a sender d) an authentication of an electronic record by tying it uniquely to a key only a sender knows e) None of above 11. In a WLAN, wireless clients and access points send and receive information through the a) Wires b) UTP Cables c) Radio waves d) Sound waves e) None of above 12. A wireless network allows: a) Easy set-up of networks in older buildings b) Addition of new employees to the existing network c) Access to the company network from outside the office d) Both (b) & (c) e) All (a), (b) & (c) 13. A network administrator needs to restrict access to the network. Which type of firewall allows only those packets that are part of a known connection? a) Proxy firewall b) Stateful firewall c) Packet filter d) Content engine e) None of above 14. Which type of program causes banners and ads to appear on the desktop without any user intervention? a) Adware b) Spyware c) Stealth virus d) Trojan horse e) None of the above 15. In HTTP communications, what role does the web browser play? a) As a client b) As a server c) As both as a client and server d) Page server e) None of above 16. Which of the following is not found in a URL? a) Port b) Path c) Post d) Protocol e) None of above 17. Which of the following character combinations are used to separate name/value pairs in a HTTP query string? a) $ and & b) = and & c) / and = d) \ and = e) None of above 18. SGML stands for a) Standard Generalized Markup Language b) Structured General Markup Language c) Standard Graphics Mapping Language d) Standard General Markup Link e) None of above 19. Client-side scripting programs are executed by: a) the web browser before making a HTTP request. b) the web browser after receiving a HTTP response containing HTML. c) the web server after generating HTML but before sending a HTTP response. d) the web server after receiving a HTTP request, but before HTML is generated. e) None of above 20. Which statement is false? a) The default port number for HTTP is 80. b) HTTP responses always return HTML. c) HTTP is stateless application protocol. d) HTTP client and server communicate by sending text messages e) None of above |
| News |
Monday, November 29, 2010
CA Quiz 2010 - 17
Saturday, November 13, 2010
CA Quiz 2010 - 16
QUIZ ON COMPUTER AWARENESS 2010 – 16
[ Total no. of questions per page is 10/20 ]
Subscribe to:
Comments (Atom)
