1.
The attackers a network of compromised devices known as
Answer: Option 'C'
Botnet
2.
Which of the following file retrieval methods use hypermedia?
Answer: Option 'A'
HTTP
3.
Which of the following is a security protocol designed to provide a wireless LAN with better security and privacy?
Answer: Option 'A'
WAP
4.
Which of the following TCP/IP protocol is used for transferring files from one machine to another?
Answer: Option 'B'
FTP
5.
When the sender and the receiver of an email are on different systems, we need only ______ .
Answer: Option 'D'
Two UAs and two pairs of MTAs
6.
MAC address is of
Answer: Option 'C'
48 bits
7.
The conditional GET mechanism
Answer: Option 'C'
Helps to keep a cache upto date
8.
The HTTP request message is sent in ____ part of three-way handshake.
Answer: Option 'C'
Third
9.
The datalink layer of Ethernet consists of _______
Answer: Option 'C'
Both (A) & (B)
10.
What is the term used to describe addresses available on a DHCP server?
Answer: Option 'C'
Scopes
11.
What can greatly reduce TCP/IP configuration problems?
Answer: Option 'C'
DHCP Server
12.
Header of a frame generally contains
Answer: Option 'D'
all of the mentioned
13.
What function does a serial interface perform in data communication?
Answer: Option 'C'
Converts parallel data into a stream of bits
14.
After you have verified that TCP/IP is installed correctly, what is the next step in verifying the TCP/IP configuration?
Answer: Option 'B'
Ping the address of the local host
15.
Identify the incorrect statement
Answer: Option 'C'
FTP sends its control information in-band
16.
You are trying to decide which type of network you will use at your office, and you want the type that will provide communication and avoid collisions on the cable. Which of the following is the best choice?
Answer: Option 'A'
Token-Ring
17.
The number of objects in a Web page which consists of 4 jpeg images and HTML text is ______
Answer: Option 'C'
5
18.
When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called
Answer: Option 'C'
DNS spoofing
19.
Eight stations are competing for the use of a shared channel using the 'Adaptive tree Walk Protocol'. If the stations 7 and 8 are suddenly become ready at once, how many bit slots are needed to resolve the contention?
Answer: Option 'A'
7 slots
20.
What is A2DP (advanced audio distribution profile)?
Answer: Option 'A'
a bluetooth profile for streaming audio