Options:
(A) Subnet masking
(B) CIDR aggregation
(C) Fragmentation
(D) Broadcasting
✅ Correct Answer: (B) CIDR aggregation
52. Private IP addresses are defined in:
Options:
(A) RFC 1918
(B) RFC 791
(C) RFC 2460
(D) RFC 1122
✅ Correct Answer: (A) RFC 1918
53. IPv6 address length is:
Options:
(A) 64 bits
(B) 96 bits
(C) 128 bits
(D) 256 bits
✅ Correct Answer: (C) 128 bits
54. Class D addresses are used for:
Options:
(A) Multicast
(B) Broadcast
(C) Unicast
(D) Experimental
✅ Correct Answer: (A) Multicast
55. CIA triad stands for:
Options:
(A) Control, Integrity, Authentication
(B) Confidentiality, Integrity, Availability
(C) Communication, Internet, Access
(D) Cryptography, Integrity, Access
✅ Correct Answer: (B) Confidentiality, Integrity, Availability
56. VPNs primarily provide:
Options:
(A) Speed
(B) Secure tunneling
(C) Routing
(D) Addressing
✅ Correct Answer: (B) Secure tunneling
57. IDS differs from IPS because IDS:
Options:
(A) Blocks traffic
(B) Detects only
(C) Encrypts packets
(D) Routes packets
✅ Correct Answer: (B) Detects only
58. HTTPS uses which security protocol:
Options:
(A) SSL/TLS
(B) IPsec
(C) SSH
(D) S/MIME
✅ Correct Answer: (A) SSL/TLS
59. Firewall rules are based on:
Options:
(A) Physical location
(B) Traffic filtering policies
(C) Application code
(D) Hardware design
✅ Correct Answer: (B) Traffic filtering policies
60. SSH is used for:
Options:
(A) File transfer
(B) Secure remote login
(C) Video streaming
(D) Routing
✅ Correct Answer: (B) Secure remote login
61. Which is an example of network application?
Options:
(A) Compiler
(B) Email
(C) BIOS
(D) Cache memory
✅ Correct Answer: (B) Email
62. Encryption ensures:
Options:
(A) Availability
(B) Confidentiality
(C) Routing
(D) Authentication only
✅ Correct Answer: (B) Confidentiality
63. Network security is critical mainly for:
Options:
(A) Home use
(B) Gaming only
(C) Enterprise and government systems
(D) Entertainment systems
✅ Correct Answer: (C) Enterprise and government systems
64. MPLS improves:
Options:
(A) Packet loss
(B) QoS and traffic engineering
(C) Encryption
(D) Addressing
✅ Correct Answer: (B) QoS and traffic engineering
65. Optical fiber supports:
Options:
(A) Low bandwidth
(B) Electrical signaling
(C) High-speed data transmission
(D) Analog signals only
✅ Correct Answer: (C) High-speed data transmission
66. 5G networks mainly enhance:
Options:
(A) Latency and speed
(B) Addressing
(C) Encryption
(D) Switching
✅ Correct Answer: (A) Latency and speed
67. SDN separates:
Options:
(A) Routers and software
(B) Control and data plane
(C) LAN and WAN
(D) IP and MAC
✅ Correct Answer: (B) Control and data plane
68. NFV replaces:
Options:
(A) Routers
(B) Switches
(C) Dedicated hardware appliances
(D) Cables
✅ Correct Answer: (C) Dedicated hardware appliances
69. IoT applications require:
Options:
(A) High power
(B) Low latency and scalability
(C) Large screens
(D) Wired connections only
✅ Correct Answer: (B) Low latency and scalability
70. Token Ring heavily relies on:
Options:
(A) Token Ring
(B) High-speed networks
(C) Dial-up
(D) Analog links
✅ Correct Answer: (A) Token Ring
71. Video conferencing is sensitive to:
Options:
(A) Address space
(B) Packet loss
(C) MAC addressing
(D) Fragmentation
✅ Correct Answer: (B) Packet loss
72. Digital transformation is driven mainly by:
Options:
(A) Manual systems
(B) High-speed networking technologies
(C) Paper-based processes
(D) Standalone computers
✅ Correct Answer: (B) High-speed networking technologies
0 comments:
Post a Comment