You are on page 1of 6

1. To print a float value which format specifier can be used?

A - %f *
B - %lf
C - %Lf
D - None of the above
2. Which operator is used to continue the definition of macro in the next line?
A - #
B - ##
C - $
D-/ *

3.Which of the following transmission directions listed is not a legitimate channel?

Simplex

Half Duplex

Full Duplex

Double Duplex *

4.The term HTTP stands for?

a. Hyper terminal tracing program


b. Hypertext tracing protocol
c. Hypertext transfer protocol *
d. Hypertext transfer program

5. Which software prevents the external access to a system?

a. Firewall *
b. Gateway
c. Router
d. Virus checker

6. Which one of the following is the most common internet protocol?


a. HTML
b. NetBEUI
c. TCP/IP *
d. IPX/SPX

7.Which one of the following is not a network topology?

a. Star
b. Ring
c. Bus
d. Peer to Peer *

8 The length of an IPv6 address is?

a. 32 bits
b. 64 bits
c. 128 bits *
d. 256 bits

 9.ThefirstNetworkwascalled________
a)CNNET
b)NSFNET
c)ASAPNET
d) ARPANET *

10.The attacker using a network of compromised devices is known as _____________


a)Internet
b)Botnet*
c)Telnet
d) D-net

11. IPSec is designed to provide security at the _________


a) Transport layer
b) Network layer *
c) Application layer
d) Session layer

12.An attempt to make a computer resource unavailable to its intended users is


called ______
a) Denial-of-service attack *
b) Virus attack
c) Worms attack
d) Botnet process

13. A DNS client is called _________


a) DNS updater
b) DNS resolver *
c) DNS handler
d) none of the mentioned

14. Scanning is performed in which phase of a pen test?

A. Pre-attack *

B. Attack

C. Post-attack

D. Reconnaissance

15.What is the attack called "evil twin"?

A. MAC Spoofing

B. ARP poisoning

C. Rogue access point *

D. Session hijacking

16. Which of the following is a passive wireless discovery tool?


A. NetStumbler

B. Airerack

C. Kismet *

D. Netsniff

17.What is another term for turning off the SSID broadcast?

A. SSID stealth

B. SSID unicast

C. SSID cloaking *

D. SSID Sec

18 Which is the correct syntax to include comment in an HTML document?

A. //
B. /* Comment */
C. // Comment //
D. <!-- Comment --> *

19 Which element/tag defines a paragraph?

A. <p> *
B. <pre>
C. <panel>
D. None of the above

20.PGP encrypts data by using a block cipher called ______


a) international data encryption algorithm *
b) private data encryption algorithm
c) internet data encryption algorithm
d) local data encryption algorithm

21.What is Wired Equivalent Privacy (WEP)?


a) security algorithm for ethernet
b) security algorithm for wireless networks *
c) security algorithm for usb communication
d) security algorithm for emails

22.UTXO stands for ___.

A. Unspent Transaction Office

B.United Transaction Office

C.United Transaction Output

D.Unspent Transaction Output *

23.Blockchain and Bitcoin are both same.

a. True
b. False *
c. Neither False nor True
d. Cannot Determine

24.Which of the following is not a blockchain component?

a. Ledger
b. Wallet
c. Certificate authority *
d. Hash

25. Identify one of the types of the blockchain network.

a. Open blockchain network


b. Constraint blockchain network
c. Private blockchain network *
d. Restricted blockchain network

26.A proxy firewall filters at _________


a) Physical layer
b) Data link layer
c) Network layer
d) Application layer
27.A stateful firewall maintains a ___________ which is a list of active connections.
a) Routing table *
b) Bridging table
c) State table
d) Connection table

 28.ICMP is used in _________


a) Ping
b) Traceroute
c) Ifconfig
d) Both Ping & Traceroute *

 29.Which of the following is an advantage of anomaly detection?


a) Rules are easy to define
b) Custom protocols can be easily analyzed
c) The engine can scale as the rule set grows *
d) Malicious activity that falls within normal usage patterns is detected

30.What is the purpose of a shadow honeypot?


a) To flag attacks against known vulnerabilities
b) To help reduce false positives in a signature-based IDS
c) To randomly check suspicious traffic identified by an anomaly detection system *
d) To enhance the accuracy of a traditional honeypot

 31.RTP is used to ________


a) carry the media stream *
b) monitor transmission statistics of streams
c) monitor quality of service of streams
d) secure the stream

You might also like