IT / Computer / Networking Questions
Q1. NETBIOS is a
Correct Answer: Protocol
Explanation:
NETBIOS (Network Basic Input Output System) provides services related to session establishment and name resolution. It works as a network protocol, not a command or device.
Explanation:
NETBIOS (Network Basic Input Output System) provides services related to session establishment and name resolution. It works as a network protocol, not a command or device.
Q2. What is the port number for NNTP?
Correct Answer: 119
Explanation:
NNTP (Network News Transfer Protocol) uses TCP port 119 to transfer Usenet news articles.
Explanation:
NNTP (Network News Transfer Protocol) uses TCP port 119 to transfer Usenet news articles.
Q3. A DNS client is called?
Correct Answer: DNS Resolver
Explanation:
A DNS resolver is the client-side component that queries DNS servers to translate domain names into IP addresses.
Explanation:
A DNS resolver is the client-side component that queries DNS servers to translate domain names into IP addresses.
Q4. In IaaS (Infrastructure as a Service), who typically owns the infrastructure equipment?
Correct Answer: Provider owns and hosts the infrastructure
Explanation:
In IaaS:
-
Provider manages servers, storage, networking
-
Customer manages OS, applications, data
Examples: AWS EC2, Azure VM.
Explanation:
In IaaS:
Provider manages servers, storage, networking
Customer manages OS, applications, data
Q5. When a packet does not fulfill ACL criteria, the packet is
Correct Answer: Dropped
Explanation:
Access Control Lists (ACLs) either permit or deny traffic. If conditions don’t match permit rules, the packet is dropped (discarded).
Explanation:
Access Control Lists (ACLs) either permit or deny traffic. If conditions don’t match permit rules, the packet is dropped (discarded).
Q6. Transport protocol used for XML/CIM is
Correct Answer: HTTP
Explanation:
XML/CIM (Common Information Model) communications typically use HTTP as the transport protocol.
Explanation:
XML/CIM (Common Information Model) communications typically use HTTP as the transport protocol.
Q7. How do storage administrators ensure secure access to storage devices?
Correct Answer: All of the above
Explanation:
Security includes:
-
Zoning
-
Physical locks
-
Shutting devices when not in use
Hence, all options are valid.
Explanation:
Security includes:
Zoning
Physical locks
Shutting devices when not in use
Hence, all options are valid.
Q8. Diskless blades can be booted in OS/application using
Correct Answer: SAN disk
Explanation:
Diskless blade servers boot using SAN (Storage Area Network) through PXE or iSCSI.
Explanation:
Diskless blade servers boot using SAN (Storage Area Network) through PXE or iSCSI.
Q9. Terminal Services Gateway adds to the TS Web Access functionality by allowing secure communication using
Correct Answer: HTTPS
Explanation:
TS Gateway uses HTTPS (TCP 443) to securely tunnel RDP traffic.
Explanation:
TS Gateway uses HTTPS (TCP 443) to securely tunnel RDP traffic.
Q10. If servers’ clock times differ, which issue is most likely?
Correct Answer: User authentication
Explanation:
Time synchronization is critical for:
-
Kerberos authentication
Clock skew causes login failures.
Explanation:
Time synchronization is critical for:
Kerberos authentication
Clock skew causes login failures.
Q11. Best way to install all available packages
Correct Answer: Red Hat / base / packages
Explanation:
Linux package installations are handled via repositories like base, which contain essential packages.
Explanation:
Linux package installations are handled via repositories like base, which contain essential packages.
Q12. Which directory contains the man pages?
Correct Answer: /usr
Explanation:
Man pages are usually stored under:
Explanation:
Man pages are usually stored under:
Q13. Default port for SMTP
Correct Answer: 25
Explanation:
SMTP uses:
-
Port 25 → mail transfer
-
Port 587 → mail submission (modern)
Explanation:
SMTP uses:
Port 25 → mail transfer
Port 587 → mail submission (modern)
Q14. Protocol used by ping
Correct Answer: ICMP
Explanation:
Ping sends ICMP Echo Request and receives Echo Reply to test connectivity.
Explanation:
Ping sends ICMP Echo Request and receives Echo Reply to test connectivity.
Q15. What is done by VLANs?
Correct Answer: Break a network into smaller broadcast domains at Layer 2
Explanation:
VLANs:
-
Reduce broadcast traffic
-
Improve security
-
Operate at OSI Layer 2
Explanation:
VLANs:
Reduce broadcast traffic
Improve security
Operate at OSI Layer 2
Q16. How many DMA channels are there in an AT-class PC?
Correct Answer: 8
Explanation:
AT PCs support 8 DMA channels (0–7).
Explanation:
AT PCs support 8 DMA channels (0–7).
Q17. Suitable processing where data is accessed one after another
Correct Answer: Sequential access device
Explanation:
Devices like magnetic tapes use sequential access.
Explanation:
Devices like magnetic tapes use sequential access.
Q18. IPv6 does not use which type of address?
Correct Answer: Broadcast
Explanation:
IPv6 replaces broadcast with:
-
Multicast
-
Anycast
-
Unicast
Explanation:
IPv6 replaces broadcast with:
Multicast
Anycast
Unicast
Q19. If HLEN in IP packet is 0101, header length is
Correct Answer: 20 bytes
Explanation:
HLEN = 5 (in 32-bit words)
5 × 4 bytes = 20 bytes
Explanation:
HLEN = 5 (in 32-bit words)
5 × 4 bytes = 20 bytes
Q20. What type of interrupt is TRAP?
Correct Answer: Internal
Explanation:
TRAP is an internally generated interrupt, often used for debugging or exceptions.
Explanation:
TRAP is an internally generated interrupt, often used for debugging or exceptions.
Q21. Cache memory works on the principle of
Correct Answer: Locality of reference
Explanation:
Programs tend to access the same memory locations repeatedly (temporal & spatial locality).
Explanation:
Programs tend to access the same memory locations repeatedly (temporal & spatial locality).
Q22. Device used to measure pulse width, frequency, rise time
Correct Answer: Oscilloscope
Explanation:
Oscilloscopes visualize voltage vs time, ideal for signal analysis.
Explanation:
Oscilloscopes visualize voltage vs time, ideal for signal analysis.
Q23. Source code file containing common functions
Correct Answer: Header file
Explanation:
Header files (.h) contain shared declarations and functions.
Explanation:
Header files (.h) contain shared declarations and functions.
Q24. A set of rules managing data communication is called
Correct Answer: Protocol
Explanation:
Protocols define how data is transmitted, received, and interpreted.
Explanation:
Protocols define how data is transmitted, received, and interpreted.
Q25. Full form of IETF
Correct Answer: Internet Engineering Task Force
Explanation:
IETF develops and maintains Internet standards (RFCs).
Explanation:
IETF develops and maintains Internet standards (RFCs).
