Download 1.Which of the following are true LAN and WAN differ in area they

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Piggybacking (Internet access) wikipedia , lookup

Network tap wikipedia , lookup

Distributed firewall wikipedia , lookup

Wireless security wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Deep packet inspection wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Computer network wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Airborne Networking wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

IEEE 1355 wikipedia , lookup

Internet protocol suite wikipedia , lookup

UniPro protocol stack wikipedia , lookup

Transcript
C:\Users\jkrishnavs\Desktop\nptelassignment\week4.txt
Thursday, April 16, 2015 12:55 PM
1.Which of the following are true
LAN and WAN differ in area they operate
2.Twisted pair cable is an example of which type of Media
Physical Media
3.Bus Topology is
All computers are linked by a single line of cable
4.Ring Topology is
Each computer or workstation is connected to two other computers
5.scrambling the order of symbols
Transposition
6.Cryptography is the study of cryptology and cryptanalysis
False
7.LAN is
Local Area Network
8.LAN's are
a network that spans a small area
9.Software sharing is
Instead of purchasing and installing a software program, its installed on the servers so that
all users can access it
10.DDos code Installation is done in which phase of adversary planning
Damage
11.To achieve data base security a log file is maintained. Which of the following are tracked
in it
User login/logout
Data accessed
Privilege management
12.When new improvements are made to software that is being used which of the tools need updates
Vulnerability Assessment tools
13.Operating system attack used by hacker uses
misconfiguration in systems
14.The controlling mechanism used to hide real location of a machine
Routing Control
15.Making fake traffic looking like real traffic to prevent DOS attack is called
padding
16.SYN flood is an example of
Denial of Service
-1-
C:\Users\jkrishnavs\Desktop\nptelassignment\week4.txt
Thursday, April 16, 2015 12:55 PM
17.Which of the following are not functions of firewall
It encrypts data transmitting in and out
18.FTP belongs to which layer
Application
19.Following is used to allow communication between two similar networks
Bridge
20.The connection from computer to modem consists of ______ pulses and modem to telephone are
______ pulses
Digital, Analog
21.Modem stands for
Modulator Demodulator
22.Standard OSI model consists of how many layers
7
23.Which of the following is correct order from bottom to top in OSI layer model
Physical, Link, Network, Transport, Session, Presentation, Application
24.Inappropriate delivery of messages and reading messages at an intermediate gateway violates
Confidentiality
25.Passive wire-tapping is
Actively listening in illicitly on conversations
26.Wire-tapping, Impersonation, Denial of service attacks are examples of
threats to networks
27.Which of the following protocol is used for transmitting files
FTP
28.TCP/IP is
Transmission Control Protocol/Internet Protocol
29.Communication channels are essential because
transfer of data needs some link to be transmitted
30.Coaxial cable is
It consists of an insulated central wire grounded by a shield of braided wire
31.Networks are classified on the basis of which of the following
Topology, Protocol, Architecture
32.Which of the following is used for wireless LAN technology
802.1
33.Hub is
electronic device used in a lan to link group of computers.
-2-
C:\Users\jkrishnavs\Desktop\nptelassignment\week4.txt
Thursday, April 16, 2015 12:55 PM
34.What is a protocol
Agreed set of rules and procedures for transmitting data between two or more devices
-3-