Questions for the Computer Science Exit Exam Part 1.
Choose the correct answer among the given alternatives provided under each questions.
Apr 14, 2024 - 04:02
Apr 14, 2024 - 13:08
0 57
1. Which of the following is not a programming language?
A. white hat hacker
B. black hat hackers
C. gray hat hackers
D. script kiddies
Correct Answer
Wrong Answer
2. An organization allows employees to work from home two days a week. Which technology should be implemented to ensure data confidentiality as data is transmitted?
A. SHS
B. VLANS
C.RAID
D.VPN
Correct Answer
Wrong Answer
3. A cybersecurity specialist is working with the IT staff to establish an effective information security plan. Which combination of security principles forms the foundation of a security plan?
A. confidentiality, integrity, and availability
B. technologies, policies, and awareness
C. secrecy, identify, and nonrepudiation
D. encryption, authentication, and identification
Correct Answer
Wrong Answer
4. Users report that the database on the main server cannot be accessed. A database administrator verifies the issue and notices that the database file is now encrypted. The organization receives a threatening email demanding payment for the decryption of the database file. What type of attack has the organization experienced?
A. man-in-the-middle attack
B. ransomeware
C. Trojan horse
D. DoS attack
Correct Answer
Wrong Answer
5. A cybercriminal sends a series of maliciously formatted packets to the database server. The server cannot parse the packets and the event causes the server crash. What is the type of attack the cybercriminal launches
A. DoS
B. man-in-the-middle
C. packet Injection
D. SQL injection
Correct Answer
Wrong Answer
6. Alice and Bob are using public key encryption to exchange a message. Which key should Alice use to encrypt a message to Bob?
A. the private key of Alice
B. the public key of Bob
C. the private key of Bob
D. the public key of Alice
Correct Answer
Wrong Answer
7. The X.509 standards defines which security technology?
A. digital certificates
B. biometrics
C. strong passwords
D. security tokens
Correct Answer
Wrong Answer
8. Mutual authentication can prevent which type of attack?
A. wireless poisoning
B. wireless IP spoofing
C. wireless sniffing
D. man-in-the-middle
Correct Answer
Wrong Answer
9. Which cybersecurity weapon scans for use of default passwords, missing patches, open ports, misconfigurations, and active IP addresses?
A. packet analyzers
B. vulnerability scanners
C. packet sniffers
D. password crackers
Correct Answer
Wrong Answer
10. Which technology can be used to ensure data confidentiality?
D. RAID
B. identity management
C. encryption
D. RAID
Correct Answer
Wrong Answer
11. What is an impersonation attack that takes advantage of a trusted relationship between two systems?
A. man-in-the-middle
B. spoofing
C. spamming
D. sniffing
Correct Answer
Wrong Answer
12. What type of attack has an organization experienced when an employee installs an unauthorized device on the network to view network traffic?
A .sniffing
B. spoofing
C. phishing
D. spamming
Correct Answer
Wrong Answer
13. What is a nontechnical method that a cybercriminal would use to gather sensitive information from an organization?
A. man-in-the-middle
B. social engineering
C. pharming
D. ransomeware
Correct Answer
Wrong Answer
14. An organization plans to implement security training to educate employees about security policies. What type of access control is the organization trying to implement?
A. administrative
B. technological
C. physical
D. logical
Correct Answer
Wrong Answer
15. ) Passwords, passphrases, and PINs are examples of which security term?
A. authorization
B. access
C. authentication
D. identification
Correct Answer
Wrong Answer
16. What technique creates different hashes for the same password?
A. SHA-256
B. HMAC
C. CRC
D. salting
Correct Answer
Wrong Answer
17. Which layer of the TCP/IP model provides a route to forward messages through an internetwork?
A. application
B. network access
C. internet
D. transport
Correct Answer
Wrong Answer
18. What service is provided by DNS?
A. Resolves domain names, such as midroc.com, into IP addresses.
B. A basic set of rules for exchanging text, graphic images, sound, video, and other multimedia files
on the web.
C. Allows for data transfers between a client and a file server.
D. Uses encryption to secure the exchange of text, graphic images, sound, and video on the web.
Correct Answer
Wrong Answer
19. What command can be used on a Windows PC to see the IP configuration of that computer?
A. Netstat
B. ping
C. Nslookup
D. ipconfig
Correct Answer
Wrong Answer
20. Network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment. Which two factors may interfere with the copper cabling and result in signal distortion and data corruption? (Choose two.)
A. crosstalk
B. extended length of cabling
C. RFI and EMI
D. signal attenuation
Correct Answer
Wrong Answer
21. A network administrator is adding a new LAN to a branch office. The new LAN must support 25 connected devices. What is the smallest network mask that the network administrator can use for the new network?
A. 255.255.255.128
B. 255.255.255.192
C. 255.255.255.224
D. 255.255.255.240
Correct Answer
Wrong Answer
22. hat does the term “attenuation” mean in data communication?
A. strengthening of a signal by a networking device
B. leakage of signals from one cable pair to another
C. time for a signal to reach its destination
D. loss of signal strength as distance increases
Correct Answer
Wrong Answer
23. What will happen if the default gateway address is incorrectly configured on a host?
A. The host cannot communicate with other hosts in the local network
B. The host cannot communicate with hosts in other networks
C. A ping from the host to 127.0.0.1 would not be successful
D. The host will have to use ARP to determine the correct address of the default gateway
E. The switch will not forward packets initiated by the host
Correct Answer
Wrong Answer
24. Which information is used by routers to forward a data packet toward its destination?
A. source IP address
B. destination IP address
C. source data-link address
D. destination data-link address
Correct Answer
Wrong Answer
25. Which IPv4 address can a host use to ping the loopback interface?
A. 126.0.0.1
B. 127.0.0.0
C. 126.0.0.0
D. 127.0.0.1
Correct Answer
Wrong Answer
26. Why is NAT not needed in IPv6?
A. Because IPv6 has integrated security, there is no need to hide the IPv6 addresses of internal
networks
B. Any host or user can get a public IPv6 network address because the number of available IPv6
addresses is extremely large.
C. The problems that are induced by NAT applications are solved because the IPv6 header improves
packet handling by intermediate routers.
D. The end-to-end connectivity problems that are caused by NAT are solved because the number of
routes increases with the number of nodes that are connected to the Internet.
Correct Answer
Wrong Answer
27. Which function is primary functions of a router?
A. packet forwarding and path selection
B. microsegmentation
C. domain name resolution
D. flow control
Correct Answer
Wrong Answer
28. What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?
A. encapsulation
B. flow control
C. access method
D. response timeout
Correct Answer
Wrong Answer
29. What type of communication will send a message to all devices on a local area network?
A. broadcast
B. multicast
C. unicast
D. allcast
Correct Answer
Wrong Answer
30. What process is used to place one message inside another message for transfer from the source to the destination?
A. access control
B. decoding
C. encapsulation
D. flow control
Correct Answer
Wrong Answer
31. What is an advantage of using standards to develop and implement protocols?
A. A particular protocol can only be implemented by one manufacturer
B. Products from different manufacturers can interoperate successfully.
C. Different manufacturers are free to apply different requirements when implementing a protocol.
D. Standards provide flexibility for manufacturers to create devices that comply with unique
requirements
Correct Answer
Wrong Answer
32. Which PDU format is used when bits are received from the network medium by the NIC of a host?
A. file
B. frame
C. packet
D. segment
Correct Answer
Wrong Answer
33. Which IEEE standard enables a wireless NIC to connect to a wireless AP that is made by a different manufacturer?
A. 802.1
B. 802.11
C. 802.3
D. 802.2
Correct Answer
Wrong Answer
34. What statement describes the function of the Address Resolution Protocol?
A. ARP is used to discover the IP address of any host on a different network.
B. ARP is used to discover the IP address of any host on the local network.
C. ARP is used to discover the MAC address of any host on a different network
D. ARP is used to discover the MAC address of any host on the local network
Correct Answer
Wrong Answer
35. When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address?
A. DNS server address
B. subnet mask
C. default gateway
D. DHCP server address
Correct Answer
Wrong Answer
36. The network layer concerns with
A. Bits
B. Frames
C. Packets
D. None of the these
Correct Answer
Wrong Answer
37. The 4 byte IP address consists of
A.
Network address
B.
Host address
C.
Both (a) and (b)
D.
None of the above
Correct Answer
Wrong Answer
38. What is the size of the Host ID in Class C?
A. 24 bits
B. 16 bits
C. 8 bits
D. 14 bits
Correct Answer
Wrong Answer
39. A router receives a packet with the destination address 132.7.21.84 and subnet mask is 255.255.0.0. Find the network address of the packet.
A. 1.32.7.0
B. 132.7.0.0
C. 13.27.0.0
D. 21.84.0.0
Correct Answer
Wrong Answer
40. Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators?
A. Internet
B. Intranet
C. Extranet
D. Extended-Net
Correct Answer
Wrong Answer
41. _____is an organization that enables individuals and businesses to connect to the Internet?
A. IPS
B. ISP
C. ISO
D. Data center
Correct Answer
Wrong Answer
42. ______ is designed to be accessible only by the organization’s members, employees, or others with authorization.
A. Internet
B)intranet
C)extranet
D)extended-net
Correct Answer
Wrong Answer
43. ______is the ultimately largest WAN?
A. Internet
B) intranet
C)extranet
D)extended-net
Correct Answer
Wrong Answer
44. ______is high bandwidth internet connection that uses telephone line?
A. DSL
B. Dial up
C. Cable modem
D. ISDN
Correct Answer
Wrong Answer
45. What criteria are used to help select a network medium from various network media?
A. the distance the selected medium can successfully carry a signal
B. the number of intermediate devices installed in the network
C. the environment where the selected medium is to be installed
D. All except b
Correct Answer
Wrong Answer
46. What method can be used by two computers at the transport layer to ensure that packets are not dropped because too much data is being sent too quickly?
A. Flow control
B. Acknowledgement
C. Sequencing
D. Segmentation
Correct Answer
Wrong Answer
47. Which one of the following does not belong to the TCP/IP protocol suite application layer protocols?
A. DHCP ,DNS ,SNMP
B. POP3,IMAP,SMTP,TFTP
C. FTP,UDP,HTTP,HTTPS
D. SSH,TELNET
Correct Answer
Wrong Answer
48. Which name is assigned to the transport layer PDU?