- Topic: Networking
- Number of Questions: 10
- Target: SBI PO, SBI Clerk, RBI Assistant, IBPS PO, IBPS Clerk, SSC CGL, SSC GD, SSC CPO, SSC MTS, SSC CHSL, Railways, etc.
Let’s Start
1. The term “distributed network” refers to a management system in which all data & information is routed through a single computer is–
- bus network
- star network
- ring network
- point to point network
See Answer
Answer: 2) Star network
Explanation: A distributed network configuration in which all data/information pass through a central computer is a star network.
2. Which of the following devices is used to connect two systems, especially if the system protocols are incompatible?
- repeater
- gateway
- bridge
- hub
See Answer
Answer: 2) gateway
Explanation: Gateway is used to connect two systems, especially if the systems use different protocols.
3. The common name for a modulator-demodulator is
- modem
- joiner
- networker
- connector
See Answer
Answer: 1) modem
Explanation: The common name for a modulator-demodulator is Modem.
4. Is there a phrase of sending data to a satellite?
- downlink
- modulate
- demodulate
- uplink
See Answer
Answer: 4) uplink
Explanation: A phrase for sending data to a satellite is Uplink.
5. Networks are monitored by security personnel and supervised by __________ who set(s) up accounts and passwords for authorized network users.
- IT managers
- the government
- password administrators
- network administrators
See Answer
Answer: 4) network administrators
Explanation: Networks are monitored by security personnel and supervised by Network administrators who set(s) up accounts and passwords for authorized network users.
6. Network security consists of:
- protection
- detection
- reaction
- all of the above
See Answer
Answer: 4) All of the above
Explanation: Protection ,detection, and Reaction are the three components of network security.
7. What is the truth regarding email security in terms of network security?
- Phishing is one of the most common ways attackers gain access to a network.
- You should know what normal network behaviour looks like so that you can spot anomalies or breaches as they happen.
- You need to employ hardware, software, and security processes to lock those apps down.
- all of the above
See Answer
Answer: 1) One of the most prevalent ways for attackers to acquire access to a network is through phishing.
Explanation: Both incoming attacks and outbound messages containing sensitive information can be blocked using email security technologies
8. What is true about VPN in Network security methods?
- a tool that authenticates the communication between a device and a secure network.
- VPN creating a secure, encrypted “tunnel” across the open internet.
- VPN typically based on IPsec or SSL.
- all of the above.
See Answer
Answer: 4) All of the above
Explanation: VPN: A technology that authenticates communication between a device and a secure network, creating a secure, encrypted “tunnel” across the open internet(usually based on IPsec or SSL)
9. Security features that limit who has access to the OS’s resources-
- Authentication
- identification
- validation
- access control
See Answer
Answer: 4) Access control
Explanation: Access control refers to the security features. Applications call access control to provide resources.
10. Which of the following is a part of the network identification process?
- user-id
- password
- OTP
- fingerprint
See Answer
Answer: 1) user id
Explanation: A part of identification is the UserID. UserID can be a mix of username, student number, and other information.