Networking: Computer Awareness MCQ Practice

Computer Awareness MCQ Practices Government Job Preparation
  • Topic: Networking
  • Number of Questions: 10
  • Target: SBI PO, SBI Clerk, RBI Assistant, IBPS PO, IBPS Clerk, SSC CGL, SSC GD, SSC CPO, SSC MTS, SSC CHSL, Railways, etc.

Let’s Start

1. The term “distributed network” refers to a management system in which all data & information is routed through a single computer is
  1. bus network
  2. star network
  3. ring network
  4. point to point network

See Answer

2. Which of the following devices is used to connect two systems, especially if the system protocols are incompatible?
  1. repeater
  2. gateway
  3. bridge
  4. hub

See Answer

3. The common name for a modulator-demodulator is
  1. modem
  2. joiner
  3. networker
  4. connector

See Answer

4. Is there a phrase of sending data to a satellite?
  1. downlink
  2. modulate
  3. demodulate
  4. uplink

See Answer

5. Networks are monitored by security personnel and supervised by __________ who set(s) up accounts and passwords for authorized network users.
  1. IT managers
  2. the government
  3. password administrators
  4. network administrators

See Answer

6. Network security consists of:
  1. protection
  2. detection
  3. reaction
  4. all of the above

See Answer

7. What is the truth regarding email security in terms of network security?
  1. Phishing is one of the most common ways attackers gain access to a network.
  2. You should know what normal network behaviour looks like so that you can spot anomalies or breaches as they happen.
  3. You need to employ hardware, software, and security processes to lock those apps down.
  4. all of the above

See Answer

8. What is true about VPN in Network security methods?
  1. a tool that authenticates the communication between a device and a secure network.
  2. VPN creating a secure, encrypted “tunnel” across the open internet.
  3. VPN typically based on IPsec or SSL.
  4. all of the above.

See Answer

9. Security features that limit who has access to the OS’s resources-
  1. Authentication
  2. identification
  3. validation
  4. access control

See Answer

10. Which of the following is a part of the network identification process?
  1. user-id
  2. password
  3. OTP
  4. fingerprint

See Answer

Share this knowledge!

Leave a Reply

Your email address will not be published. Required fields are marked *