Home
Mcqs
Quizes
Q&A
Past Paper
blog
Spaces
Join Now
Sign in
Harlequin Misha
COMPUTER SCIENCE & IT
-
Computer Networks & Security
Which of the following is the most efficient encoding to send data via networks? Also consider the reasoning in your answer.
A. 3-Excess codes because it is not weighted.
B. Binary, because its representation can be done simply with zeros and ones.
C. Decimal, because a decimal requires lesser space to represent the same number.
D. None of these.
Harlequin Misha
COMPUTER SCIENCE & IT
-
Computer Networks & Security
Network traffic estimation is:
A. Impossible.
B. Easily computable via linear equations.
C. Can only be solved using AI techniques.
D. None of these.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Computer Networks & Security
Why is it important to regularly update software and firmware in network devices?
A. To increase network bandwidth.
B. To improve network performance.
C. To fix security vulnerabilities and bugs.
D. To enhance network reliability.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Computer Networks & Security
Who is responsible for managing digital certificates in a Public Key Infrastructure (PKI) system?
A. Certificate Authority (CA).
B. Network Administrator.
C. End-users.
D. Internet Service Provider (ISP).
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Computer Networks & Security
Where is the most secure location to place a firewall within a network architecture?
A. Between the router and the internal network.
B. Outside the demilitarized zone (DMZ).
C. Inside the DMZ, but before the web server.
D. After the switch, but before the router.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Computer Networks & Security
When should an organization implement two-factor authentication (2FA) for remote access to its network resources?
A. During regular business hours.
B. After a security breach has occurred.
C. Whenever employees work remotely or access sensitive data.
D. Only for executive-level employees.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Computer Networks & Security
What is the purpose of a subnet mask in IP networking?
A. To identify the network portion of an IP address.
B. To prevent IP spoofing attacks.
C. To encrypt data packets for secure transmission.
D. To assign unique IP addresses to devices on a network.
COMPUTER SCIENCE & IT
Web Design & Development
Database Management Systems
Computer Networks & Security
Operating Systems
Data Structures & Algorithms
Information Systems Auditing Process
Governance and Management of Information Technology
Information Systems Acquisition Development & Implementation
Information Systems Operations and Business Resilience
Protection of Information Assets
Programming
Cybersecurity
Software Engineering