Computer MCQS

251. Network layer firewall works as a:
A. Frame Filter
B. Packet Filter
C. Both A and B
D. None of the above


252. Network Layer firewall has two subcategories as:
A. Stateful firewall and stateless firewall
B. Bit-oriented firewall and byte-oriented firewall
C. Frame firewall and packet firewall
D. None of the mentioned


253. WPA2 is used for security in:
A. Ethernet
B. Bluetooth
C. Wi-Fi
D. None of the above


254. An attempt to make a computer resource unavailable to its intended users is called:
A. Denial-of-service attack
B. Virus attack
C. Worms attack
D. Botnet process


255. Extensible Authentication Protocol is an authentication framework frequently used in:
A. Wired personal area network
B. Wireless networks
C. Wired local area network
D. None of the above


256. Pretty Good Privacy (PGP) is used in:
A. Browser security
B. Email security
C. FTP security
D. None of the mentioned


257. PGP encrypts data by using a block cipher called:
A. International Data Encryption Algorithm
B. Private Data Encryption Algorithm
C. Internet Data Encryption Algorithm
D. None of the above


258. When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called:
A. DNS lookup
B. DNS Hijacking
C. DNS Spoofing
D. None of the above


259. Which of the following delays is faced by the packet in traveling from one end system to another?
A. Propagation delay
B. Queuing delay
C. Transmission Delay
D. All of the above


260. For a 10Mbps Ethernet link, if the length of the packet is 32 bits, the transmission delay is (in milliseconds):
A. 3.2
B. 32
C. 0.32
D. None of the above


Leave a Reply

Your email address will not be published. Required fields are marked *