Description : A packet filtering firewall can a. deny certain users from accessing a service b. block worms and viruses from entering the network c. disallow some files from being accessed through FTP d. block some hosts from accessing the network
Last Answer : d. block some hosts from accessing the network
Description : Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1) Application layer Firewall 2) Packet Filtering Firewall 3) Router enhanced firewall 4) IP enabled firewall
Last Answer : 2) Packet Filtering Firewall
Description : Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1 Application layer Firewall 2 Packet Filtering Firewall 3 Router enhanced firewall 4 IP enabled firewall
Last Answer : 2 Packet Filtering Firewall
Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii, ... iv and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Last Answer : D) All i, ii, iii, iv and v
Description : Unauthorized copying of software to be used for personal gain instead of for personal backup is called ______: a) program thievery b) data snatching c) software piracy d) program looting e) data looting
Last Answer : c) software piracy
Description : Which device is used to backup the data? A) Floppy Disk B) Tape C) Network Drive D) All of the above
Last Answer : Answer : D
Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii ... and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Description : Which among the following is best suitable for term "Software Piracy": a) Counterfeiting original products b) Illegal copying of genuine program c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : Determine from the following the basic mode of transmission system in the public data network in which data are transferred from the source to the network and from the network to the destination in the frame format. A. Voice mode B. Asynchronous mode C. Synchronous mode D. Packet mode
Last Answer : D. Packet mode
Description : Software that prevents unauthorized persons from accessing certain parts of a program, database or network is: a) Firewall b) Scanner c) Anti - Virus d) None of These
Last Answer : a) Firewall
Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way
Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way
Description : A computer checks the _____ of user names and passwords for 9 a match before granting access. 1) Website 2) Network 3) Backup file 4) Data base 5) None of these
Last Answer : Answer :4
Description : Which of the following statements are true? a) Data can be recovered fastest in online backup b) Tape library is an example of nearline storage c) Data recovery can take hours for offline backup d) All of the mentioned
Last Answer : All of the mentioned
Description : Which of the following is correct about Star Topology: a) Data on a star network passes through the hub, swithc or concentrator before continuing to its destination. b) The hub, switch or concentrator manages and ... connecting all of the systems to a central node. d) All of Above e) None of These
Last Answer : d) All of Above
Description : A packet filtering firewall operates at which of the following OSI layer? 1) At the Application layer 2) At the Transport Layer 3) At the Network Layer 4) Both 2 and 3
Last Answer : 4) Both 2 and 3
Description : A packet filtering firewall operates at which of the following OSI layer? 1 At the Application layer 2 At the Transport Layer 3 At the Network Layer 4 Both 2 and 3
Last Answer : 4 Both 2 and 3
Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks A) ... v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Last Answer : B) i, iii, iv and v only
Description : Which of the following is false? a) The more important the data, the greater the need for backing it up b) A backup is as useful as its associated restore strategy c) Storing the ... near to its original site is best strategy d) Automated backup and scheduling is preferred over manual operations
Last Answer : Storing the backup copy near to its original site is best strategy
Description : Which process is used to reinstall data from a copy when the original data has been lost? a) Backup b) Recovery c) Benchmarking d) Data cleansing
Last Answer : b) Recovery
Description : Which process is used to reinstall data from a copy when the original data has been lost? a. backup b. recovery c. benchmarking d. data cleansing
Last Answer : b. recovery
Description : The _______ address in theheader ofa packet in adatagram network normally remains thesame during the entire journeyof the packet. A) source B) destination C) local D) none of the above
Last Answer : destination
Description : A switchin a datagram network uses arouting tablethat is based on the ______address. A) source B) destination C) local D) none of the above
Description : Consider a source computer(S) transmitting a file of size 106 bits to a destination computer (D)over a network of two routers (R1 and R2) and three links(L1, L2, and L3). L1connects S to R1; L2 connects R1 to ... file from S to D? a. 1005 ms b. 1010 ms c. 3000 ms d. 3003 ms Answer: Option(a)
Last Answer : a. 1005 ms
Description : In virtual circuit network each packet contains ___________ a. full source and destination address b. a short VC number c. only source address d. only destination address
Last Answer : b. a short VC number
Description : In virtual circuit network each packet contains ___________ A. full source and destination address B. a short VC number C. only source address D. only destination address
Last Answer : B. a short VC number
Description : ______ layer is responsible for sending of IP datagrams from the source network to the destination network. A. Application layer B. Transport layer C. Network layer D. Link layer
Last Answer : The correct answer is: C. Network layer The network layer is responsible for routing and forwarding IP datagrams from the source network to the destination network. It provides logical addressing ... at the network layer include IP (Internet Protocol) and ICMP (Internet Control Message Protocol).
Description : Classification of data points is a technique of A : Recursive filtering B : Filtering C : Laandmark D : Pose estimation
Last Answer : A : Recursive filtering
Description : Physical security is concerned with protecting computer hardware from human tampering and natural disasters and _____security is concerned with protecting software from unauthorized tampering or damage: a) Data b) Cyber c) Internet d) Meta Physical e) Publicity
Last Answer : b) Cyber
Description : ____________ refer to renewing or changing components like increasing the main memory, or hard disk capacities, or adding speakers, or modems, etc. a) Grades b) Prosody c) Synthesis d) Upgrades
Last Answer : Answer: d Explanation: Upgrades is the right term to be used. Upgrades are installed to renew or implement a new feature. Except for upgrades, hardware is normally one-time expense
Description : When copying data from one drive to another is it common to have slightly different file sizes or should they be exactly the same?
Last Answer : I’ve had them show up as slightly different. I think it may be due to different hard drive formatting or file storage issues.
Description : I have problems accessing folders shared on the network on a Win7 machine from a virtual WinXP machine. What can I do to fix it?
Last Answer : My system is run from XP then to a D-link router to a Windows 7 laptop.and I send folders by internet. Not exactly your problem but it works. If those folders are in an earlier Office on the XP you ... at all. I do love my favorite solution for most computer problems I call my son to come over. :-)
Description : Security cameras are only effective if there is a backup tape.?
Last Answer : Security cameras are only effective if there is a backup tape.
Description : 7.How does traceroute work? A. It uses an ICMP destination-unreachable message to elicit the name of a router. B. It sends a specially crafted IP packet to a router to locate the number of hops from ... the TTL value in an ICMP message to determine the number of hops from the sender to the router.
Last Answer : D. It uses the TTL value in an ICMP message to determine the number of hops from the sender to the router.
Description : Which algorithm is used to decide the path to transfer the packets from source to destination? (1) Routing (2) Pathing (3) Selecting (4) Directing
Last Answer : Routing
Description : What do primary investigator consider from the original source : a. Summarize and hold the data b. Whether to analyze more data or to extract more data c. Examine the data and store it d. Compress the data
Last Answer : b. Whether to analyze more data or to extract more data
Description : Which of the following devices takes data sent from one network device and forwards it to the destination node based on MAC address ? a. Hub b. Modem c. Switch d. Gateway
Last Answer : c. Switch
Description : _______ inthe data link layer separates a message from one source toa destination, or from other messages going from other sources to other destinations. A) Digitizing B) Controlling C) Framing D) none of the above
Last Answer : Framing
Description : Which processes does TCP, but not UDP, use?Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data * Destination Port - 16 bits, Source Port - 16 bits, Length - ... * Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data
Last Answer : Correct answer: A The UDP format for a segment is as follows: Source Port 16 bits Destination Port 16 bits Length 16 bits Checksum 16 bits Data xx bits
Description : External Entities may be a A) Source of input data only B) Source of input data or destination of results C) Destination of results only D) Repository of data
Last Answer : B) Source of input data or destination of results
Description : Backup of the source data can be created a) On the same device b) On another device c) At some other location d) All of the mentioned
Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks ... only C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Description : Which among the below stated datagram discard code fields in ICMP is/are generated if a router fails to forward a packet due to administrative filtering? a. Source Route Failed b. Communication Administratively Prohibited c. Host Precedence Violation d. Precedence Cut-off in Effect
Last Answer : b. Communication Administratively Prohibited
Description : The method of accessing the I/O devices by repeatedly checking the status flags is_________ A. Memory-mapped I/O B. Program-controlled I/O C. I/O mapped D. None of the Above
Last Answer : B. Program-controlled I/O