Académique Documents
Professionnel Documents
Culture Documents
1. Four workstations are connected using a Star topology. Find the number of communication links
in the network and communication cost (in terms of number of hops) between two
workstations?
options
a) 4 and 2 b) 8 and 2
c) 8 and 1 d) 4 and 1 answer : a
2. Which of the following protocols is used to transfer files between a client and a server?
options
a) HTTP b) SMTP
c) FTP d) Telnet answer : c
4. Assume while browsing Internet, in your web browser you have typed a URL and the DNS will
convert this URL in to an appropriate IP-address, suppose your network is connected with
multiple DNS servers and your local DNS is not able to resolve the given URL in to appropriate IP
address, then which of the following can happen?
options answer : c
a) Browser will give an error message `that page not found’
b) This kind of situation never happens
c) Local DNS will forward the request to next DNS connected to it
5. Whenever you open the Infosys in-house leave application, it displays your leave balance. What
is the type of the content?
options
a) Dynamic Content b) Active Content
c) Static Content answer : a
6. Consider a scenario in which you are depending on an ISP and each time you login to the ISP
network using username and password, a new IP address is provided by the ISP to access the
Internet.
Which of the following server provides this kind of IP address?
options
a) DNS server b) Proxy server
c) Groupware server d) DHCP server answer : d
8. Consider a scenario, where user placed an order for 100 copies of a book through online book
shopping website. Required number of copies is ready to be delivered to the user but now the
user says that the order is not placed from his/her end. Which of the following concept will
ensure that one cannot deny their performed action?
options
a) Availability b) Integrity
c) Non-Repudiation d) Confidentially answer :c
9. A company requires a cost effective solution of having a private communication between two
sites, located in different countries, which should have encryption and authorization features.
10. In Asymmetric Encryption, if a public key is used to encrypt the message, the message can be
decrypted using _____________.
options
a) private Key b) either public key or private key
c) public key answer : a
11. Which of the following component of the URL is implicit when HTTP protocol is used for fetching
the content?
options
a) Protocol b) Port number
c) Hostname d) Path answer : b
14. XYZ Company was facing a problem in its web application. Initially, the company's web
application was accessed by less than 100 users and the response was quick. Later, the web
application performance got worse when the number of users accessing application was
increased to 1000. Which of the following Non-functionality is lagging in the web application?
Note: The Company doesn't want to deploy more than one server.
options
a) Availability b) Scalability c) Load balancing d) Turnaround time of
the application answer :b
15. Which is the correct and complete TCP/IP sequence from top to bottom?
options answer :d
a) Application Layer, Internet Layer, Transport Layer, Network Access Layer
b) Network Access Layer, Transport Layer, Internet Layer, Application Layer
c) Network Access Layer, Internet Layer, Transport Layer, Application Layer
17. Which of the following application security consideration deals with identity verification?
options answer : a
a) Authentication b) Authorization
c) Confidentially d) Data Integrity
18. Which of the following load balancing schemes can detect which server is overloaded?
options
a) Distributed Content (Among Host)
b) Distributed Content (Among provider)
c) DNS Load Balancing
d) Hardware and Software Load Balancing answer : d
19. Which of the following device is used for interconnecting heterogeneous networks?
options
a) Router b) Repeater
c) Bridge d) Gateway answer : d