Information Technology Tools and Network Basics Theory Question
Introduction to Internet and WWW - Set 2
Which is not a firewall technique ?
Packet filters
Application Gateways
Proxy Servers
Fire Proxy Service
Answer : D
Explain: A firewall is a network security device that prevents unauthorized access to a network. It inspects incoming and outgoing traffic. Some firewall technique : Packet-filtering Firewalls, Circuit-level Gateways, Application-level Gateways (Proxy Firewalls) and Cloud Firewalls etx.
OSI refernce layer responsible for routing _____
Physical
Network
Data link
Transport
Answer : B
Explain: Network layer is responsible for routing, multi node routing and I.P assign ( addressing). Data in this layer in form of Packets.
One format for Lan OS ?
Common server
Place to Place
CSMA / CD
Peer to Peer
Answer : D
Explain: Peer-to-peer network operating systems allow users to share resources and files located on their computers and to access shared resources found on other computers.
Which is not required hardware for LAN ?
NIC
File server
Coaxiable cable
Monitor Server
Answer : D
Explain: Server monitoring helps you access servers in real-time. By keeping track tells us the health and performance of server.But it is not need in LAN.
Different local area networks can be interconnected by which of the following ?
hub
repeater
tunnel
bridge
Answer : D
Explain: A bridge in a computer network is a device used to connect multiple LANs together with a larger Local Area Network (LAN).
Which is not a packet switched WAN ?
ATM
ISDN
Frame Replay
X.25
Answer : B
Explain: X.25 is the first switched WAN which was introduced in the year 1970. The frame relay standard was introduced to replace the slow X.25 standard. The ATM is referred to as a cell relay protocol. ATM is a standard used to implement a switched WAN which uses packet switching technology.
Which service provides dynamic IP addressing to clients ?
WINS
DNS
DHCP
PPP
Answer : C
Explain: Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address.
Popular access method for computer network ?
Bus Token
Ethernet
Token Ring
P2P
Answer : B
Explain: Ethernet is defined as a networking technology that includes the protocol, port, cable, and computer chip needed to plug a desktop or laptop into a local area network (LAN).
Which address is permitted not to use two forward slashes ?
Http
SMTP
News address
Telnet URL
Answer : D
Explain: Telnet is a network protocol used to virtually access a computer and to provide a two-way, collaborative and text-based communication channel between two machines.
Netiquette is a rule related to _____
Food habits
Cyber habits
Retailing habits
Banking habits
Answer : B
Explain: Netiquette thus describes the rules of conduct for respectful and appropriate communication on the internet.
The Image Map is stored in a layer below the picture is called ?
Server side Image Map
Pics Image Map
Client side image Map
None of above
Answer : A
Explain: Image maps are of two types Client side and Server side.
Which is not an example of LAN Based messaging ?
Domino
IIS
Exchange
Groupwise
Answer : A
E-mails and its related data is stored on
Attachment
Computer hard disk
Mail box
Google drive
Answer : C
Explain: A mailbox (also electronic mailbox) is the destination to which electronic mail messages are delivered.
MAN stands for :
Man Area Network
Metro Area Network
Metropolitan Area Network
Metropolitan Area Networking
Answer : C
Explain: A metropolitan area network (MAN) is a computer network that connects computers within a metropolitan area, which could be a single large city, multiple cities and towns.
Which of the following service is used to convert domain name to ip address ?
NFS
SMS
DNS
SDN
Answer : C
Explain: DNS servers translate requests for names into IP addresses, controlling which server an end user will reach when they type a domain name into their web browser.