* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download 1.Which of the following are true LAN and WAN differ in area they
Piggybacking (Internet access) wikipedia , lookup
Network tap wikipedia , lookup
Distributed firewall wikipedia , lookup
Wireless security wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Deep packet inspection wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Computer network wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Airborne Networking wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
C:\Users\jkrishnavs\Desktop\nptelassignment\week4.txt Thursday, April 16, 2015 12:55 PM 1.Which of the following are true LAN and WAN differ in area they operate 2.Twisted pair cable is an example of which type of Media Physical Media 3.Bus Topology is All computers are linked by a single line of cable 4.Ring Topology is Each computer or workstation is connected to two other computers 5.scrambling the order of symbols Transposition 6.Cryptography is the study of cryptology and cryptanalysis False 7.LAN is Local Area Network 8.LAN's are a network that spans a small area 9.Software sharing is Instead of purchasing and installing a software program, its installed on the servers so that all users can access it 10.DDos code Installation is done in which phase of adversary planning Damage 11.To achieve data base security a log file is maintained. Which of the following are tracked in it User login/logout Data accessed Privilege management 12.When new improvements are made to software that is being used which of the tools need updates Vulnerability Assessment tools 13.Operating system attack used by hacker uses misconfiguration in systems 14.The controlling mechanism used to hide real location of a machine Routing Control 15.Making fake traffic looking like real traffic to prevent DOS attack is called padding 16.SYN flood is an example of Denial of Service -1- C:\Users\jkrishnavs\Desktop\nptelassignment\week4.txt Thursday, April 16, 2015 12:55 PM 17.Which of the following are not functions of firewall It encrypts data transmitting in and out 18.FTP belongs to which layer Application 19.Following is used to allow communication between two similar networks Bridge 20.The connection from computer to modem consists of ______ pulses and modem to telephone are ______ pulses Digital, Analog 21.Modem stands for Modulator Demodulator 22.Standard OSI model consists of how many layers 7 23.Which of the following is correct order from bottom to top in OSI layer model Physical, Link, Network, Transport, Session, Presentation, Application 24.Inappropriate delivery of messages and reading messages at an intermediate gateway violates Confidentiality 25.Passive wire-tapping is Actively listening in illicitly on conversations 26.Wire-tapping, Impersonation, Denial of service attacks are examples of threats to networks 27.Which of the following protocol is used for transmitting files FTP 28.TCP/IP is Transmission Control Protocol/Internet Protocol 29.Communication channels are essential because transfer of data needs some link to be transmitted 30.Coaxial cable is It consists of an insulated central wire grounded by a shield of braided wire 31.Networks are classified on the basis of which of the following Topology, Protocol, Architecture 32.Which of the following is used for wireless LAN technology 802.1 33.Hub is electronic device used in a lan to link group of computers. -2- C:\Users\jkrishnavs\Desktop\nptelassignment\week4.txt Thursday, April 16, 2015 12:55 PM 34.What is a protocol Agreed set of rules and procedures for transmitting data between two or more devices -3-