Questions for the Computer Science Exit Exam Part 1.

Choose the correct answer among the given alternatives provided under each questions.

Apr 14, 2024 - 04:02
Apr 14, 2024 - 13:08
 0  57

1. Which of the following is not a programming language?

A. white hat hacker
B. black hat hackers
C. gray hat hackers
D. script kiddies

2. An organization allows employees to work from home two days a week. Which technology should be implemented to ensure data confidentiality as data is transmitted?

A. SHS
B. VLANS
C.RAID
D.VPN

3. A cybersecurity specialist is working with the IT staff to establish an effective information security plan. Which combination of security principles forms the foundation of a security plan?

A. confidentiality, integrity, and availability
B. technologies, policies, and awareness
C. secrecy, identify, and nonrepudiation
D. encryption, authentication, and identification

4. Users report that the database on the main server cannot be accessed. A database administrator verifies the issue and notices that the database file is now encrypted. The organization receives a threatening email demanding payment for the decryption of the database file. What type of attack has the organization experienced?

A. man-in-the-middle attack
B. ransomeware
C. Trojan horse
D. DoS attack

5. A cybercriminal sends a series of maliciously formatted packets to the database server. The server cannot parse the packets and the event causes the server crash. What is the type of attack the cybercriminal launches

A. DoS
B. man-in-the-middle
C. packet Injection
D. SQL injection

6. Alice and Bob are using public key encryption to exchange a message. Which key should Alice use to encrypt a message to Bob?

A. the private key of Alice
B. the public key of Bob
C. the private key of Bob
D. the public key of Alice

7. The X.509 standards defines which security technology?

A. digital certificates
B. biometrics
C. strong passwords
D. security tokens

8. Mutual authentication can prevent which type of attack?

A. wireless poisoning
B. wireless IP spoofing
C. wireless sniffing
D. man-in-the-middle

9. Which cybersecurity weapon scans for use of default passwords, missing patches, open ports, misconfigurations, and active IP addresses?

A. packet analyzers
B. vulnerability scanners
C. packet sniffers
D. password crackers

10. Which technology can be used to ensure data confidentiality?

D. RAID
B. identity management
C. encryption
D. RAID

11. What is an impersonation attack that takes advantage of a trusted relationship between two systems?

A. man-in-the-middle
B. spoofing
C. spamming
D. sniffing

12. What type of attack has an organization experienced when an employee installs an unauthorized device on the network to view network traffic?

A .sniffing
B. spoofing
C. phishing
D. spamming

13. What is a nontechnical method that a cybercriminal would use to gather sensitive information from an organization?

A. man-in-the-middle
B. social engineering
C. pharming
D. ransomeware

14. An organization plans to implement security training to educate employees about security policies. What type of access control is the organization trying to implement?

A. administrative
B. technological
C. physical
D. logical

15. ) Passwords, passphrases, and PINs are examples of which security term?

A. authorization
B. access
C. authentication
D. identification

16. What technique creates different hashes for the same password?

A. SHA-256
B. HMAC
C. CRC
D. salting

17. Which layer of the TCP/IP model provides a route to forward messages through an internetwork?

A. application
B. network access
C. internet
D. transport

18. What service is provided by DNS?

A. Resolves domain names, such as midroc.com, into IP addresses.
B. A basic set of rules for exchanging text, graphic images, sound, video, and other multimedia files on the web.
C. Allows for data transfers between a client and a file server.
D. Uses encryption to secure the exchange of text, graphic images, sound, and video on the web.

19. What command can be used on a Windows PC to see the IP configuration of that computer?

A. Netstat
B. ping
C. Nslookup
D. ipconfig

20. Network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment. Which two factors may interfere with the copper cabling and result in signal distortion and data corruption? (Choose two.)

A. crosstalk
B. extended length of cabling
C. RFI and EMI
D. signal attenuation

21. A network administrator is adding a new LAN to a branch office. The new LAN must support 25 connected devices. What is the smallest network mask that the network administrator can use for the new network?

A. 255.255.255.128
B. 255.255.255.192
C. 255.255.255.224
D. 255.255.255.240

22. hat does the term “attenuation” mean in data communication?

A. strengthening of a signal by a networking device
B. leakage of signals from one cable pair to another
C. time for a signal to reach its destination
D. loss of signal strength as distance increases

23. What will happen if the default gateway address is incorrectly configured on a host?

A. The host cannot communicate with other hosts in the local network
B. The host cannot communicate with hosts in other networks
C. A ping from the host to 127.0.0.1 would not be successful
D. The host will have to use ARP to determine the correct address of the default gateway
E. The switch will not forward packets initiated by the host

24. Which information is used by routers to forward a data packet toward its destination?

A. source IP address
B. destination IP address
C. source data-link address
D. destination data-link address

25. Which IPv4 address can a host use to ping the loopback interface?

A. 126.0.0.1
B. 127.0.0.0
C. 126.0.0.0
D. 127.0.0.1

26. Why is NAT not needed in IPv6?

A. Because IPv6 has integrated security, there is no need to hide the IPv6 addresses of internal networks
B. Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large.
C. The problems that are induced by NAT applications are solved because the IPv6 header improves packet handling by intermediate routers.
D. The end-to-end connectivity problems that are caused by NAT are solved because the number of routes increases with the number of nodes that are connected to the Internet.

27. Which function is primary functions of a router?

A. packet forwarding and path selection
B. microsegmentation
C. domain name resolution
D. flow control

28. What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?

A. encapsulation
B. flow control
C. access method
D. response timeout

29. What type of communication will send a message to all devices on a local area network?

A. broadcast
B. multicast
C. unicast
D. allcast

30. What process is used to place one message inside another message for transfer from the source to the destination?

A. access control
B. decoding
C. encapsulation
D. flow control

31. What is an advantage of using standards to develop and implement protocols?

A. A particular protocol can only be implemented by one manufacturer
B. Products from different manufacturers can interoperate successfully.
C. Different manufacturers are free to apply different requirements when implementing a protocol.
D. Standards provide flexibility for manufacturers to create devices that comply with unique requirements

32. Which PDU format is used when bits are received from the network medium by the NIC of a host?

A. file
B. frame
C. packet
D. segment

33. Which IEEE standard enables a wireless NIC to connect to a wireless AP that is made by a different manufacturer?

A. 802.1
B. 802.11
C. 802.3
D. 802.2

34. What statement describes the function of the Address Resolution Protocol?

A. ARP is used to discover the IP address of any host on a different network.
B. ARP is used to discover the IP address of any host on the local network.
C. ARP is used to discover the MAC address of any host on a different network
D. ARP is used to discover the MAC address of any host on the local network

35. When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address?

A. DNS server address
B. subnet mask
C. default gateway
D. DHCP server address

36. The network layer concerns with

A. Bits
B. Frames
C. Packets
D. None of the these

37. The 4 byte IP address consists of

A. Network address
B. Host address
C. Both (a) and (b)
D. None of the above

38. What is the size of the Host ID in Class C?

A. 24 bits
B. 16 bits
C. 8 bits
D. 14 bits

39. A router receives a packet with the destination address 132.7.21.84 and subnet mask is 255.255.0.0. Find the network address of the packet.

A. 1.32.7.0
B. 132.7.0.0
C. 13.27.0.0
D. 21.84.0.0

40. Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators?

A. Internet
B. Intranet
C. Extranet
D. Extended-Net

41. _____is an organization that enables individuals and businesses to connect to the Internet?

A. IPS
B. ISP
C. ISO
D. Data center

42. ______ is designed to be accessible only by the organization’s members, employees, or others with authorization.

A. Internet
B)intranet
C)extranet
D)extended-net

43. ______is the ultimately largest WAN?

A. Internet
B) intranet
C)extranet
D)extended-net

44. ______is high bandwidth internet connection that uses telephone line?

A. DSL
B. Dial up
C. Cable modem
D. ISDN

45. What criteria are used to help select a network medium from various network media?

A. the distance the selected medium can successfully carry a signal
B. the number of intermediate devices installed in the network
C. the environment where the selected medium is to be installed
D. All except b

46. What method can be used by two computers at the transport layer to ensure that packets are not dropped because too much data is being sent too quickly?

A. Flow control
B. Acknowledgement
C. Sequencing
D. Segmentation

47. Which one of the following does not belong to the TCP/IP protocol suite application layer protocols?

A. DHCP ,DNS ,SNMP
B. POP3,IMAP,SMTP,TFTP
C. FTP,UDP,HTTP,HTTPS
D. SSH,TELNET

48. Which name is assigned to the transport layer PDU?

A. Segment
B. Packet
C. Frame
D. Bit/signal