Q1. Which of the following topologies provides a highly fault-tolerant architecture?
(a) Star
(b) Bus
(c) Ring
(d) Mesh
(e) Tree
Q2. Which of the following statements is incorrect for TELNET?
(a) It is an application layer protocol.
(b) It does not provide security on its own.
(c) It provides encryption feature.
(d) It provides bidirectional text-oriented communication
(e) None of these
Q3. Which of the following techniques is used by unethical hackers to certify fake data over the data over the Internet for stealing confidential information?
(a) Phishing
(b) Spear Phishing
(c) Logic Bomb
(d) Spoofing
(e) Cracking
Q4._______ ensures secure transfer of data over an unsecured network, such as the Internet.
(a) Antivirus
(b) Hacking
(c) Cracking
(d) Spoofing
(e) Cryptography
Q5. Which of the following is/are the benefits of subnetting?
(a) Preservation of address space
(b) Reduced network traffic
(c) Better security
(d) Enhanced performance
(e) All of these
Q6. Which of the following techniques minimizes the interference between wireless devices?
(a) FCS
(b) RTFS
(c) HCFS
(d) FSSH
(e) FHSS
Q7. Software that gathers confidential information of a person without his or her permission and sends that information to another person is called?
(a) Antivirus
(b) Spyware
(c) Spam
(d) Trojan Horse
(e) Adware
Q8.Which of the following models does the working of Bluetooth devices depend?
(a) Client/Server
(b) LAN
(c) Master/Slave
(d) Analog/Digital
(e) None of these
Q9. How many IP addresses would be there in a block containing the mask /28?
(a) 16
(b) 32
(c) 64
(d) 128
(e) 256
Q10. Which protocol does ping, the computer network administration software utility use?
(a) TCP
(b) ARP
(c) Telnet
(d) ICMP
(e) BootIP