We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2
Multiple Choice Questions 9.
What type of malware spreads through a
1. What is the central component in a Star computer's memory? Topology network? A. Virus A. A hub B. Worm B. A switch C. Trojan Horse C. A router D. Logic Bomb D. A bridge 10. What is a hidden entrance into a system 2. In a Hierarchical topology, which type of that bypasses security checks called? computer controls smaller ones? A. Virus A. Slave B. Worm B. Client C. Trojan Horse C. Master D. Backdoor D. Node 11. It is a private network within a public 3. What is the main characteristic of a Ring network. Topology? A. Extranets A. Centralized control B. Virtual Private Networks B. Peer-to-peer communication C. Network News Transfer Protocol C. Hierarchical structure D. Internet Addresses D. Bus-based transmission 12. This is a password-controlled network for 4. In a Bus Topology, how are devices private users rather than the general public. connected? A. Extranets A. To a central hub B. Virtual Private Networks B. To each other in a ring C. Network News Transfer Protocol C. To a single cable D. Internet Addresses D. In a hierarchical structure 13. The three types of addresses for 5. What is the primary advantage of a Client- communications. Server model? A. E-mail address, URL address, IP address A. Centralized control B. E-mail address, Web address, URL B. Reduced network traffic address C. Increased complexity C. Domain address, Web address, URL D. Lower security address 6. What is the process of managing network D. Domain address, E-mail address, URL communication called? address A. Network Control 14. Individual computers attached to a network B. Data Transmission – currently represented by a 32-bit data packet. C. Network Topology A. E-mail address D. Network Protocol B. Protocols 7. What technique is used to avoid data C. IP address collisions in a network? D. URL address A. Polling 15. The most popular protocol for transmitting B. Token Passing e-mail messages. C. Carrier Sensing A. Security Protocols D. All of the above B. Network News Transfer Protocol 8. What is a harmful program that can damage C. Internet Protocols a computer called? D. Simple network mail protocol A. Worm 16. Messages are divided into small packets for B. Virus transmission. C. Trojan Horse A. File transfer protocols D. Backdoor B. Packet switching C. Weak backup procedures D. Risk of virus infection 17. Rules and standards governing the design ANWER KEYS: of hardware and software that permit users of networks. Multiple Choice Questions A. Protocols 1. A B. Internet protocols 2. C C. Security protocols 3. B D. Mail protocols 4. C 18. Basic protocol that permits communication 5. A. between Internet sites. 6. D A. Protocols 7. D B. Internet protocols 8. B C. Security protocols 9. B D. Mail protocols 10. D 19. A document format used to produce Web 11. B pages. 12. A A. HTTP 13. A B. HTML 14. C C. HTTP-NG 15. D D. HTTP-LG 16. B 20. Controls Web browsers that access the 17. A Web. 18. B A. HTTP 19. B B. HTML 20. A C. HTTP-NG D. HTTP-LG Identification Questions 1. Star Topology 2. Token Passing Identification Questions 3. Trojan Horse 1. A type of network topology where devices 4. Worm are connected to a central hub. 5. Logic bomb 2. A technique where a special signal is passed 6. Hypertext transport protocol-next around a network to control data transmission. generation 3. A harmful program that pretends to be 7. Security sockets layer legitimate software but contains malicious 8. Wide Area Networks code. 9. Open system interface 4. A software that replicates itself and spreads 10. Privacy enhanced mail through a network. 5. A type of malware that activates under specific conditions. 6. HTTP-NG 7. SSL 8. WAN 9. OSI 10. PEM
Gmail - Information II Physical Interview , 05th May 2025 II Josh Technology Group II Internship + Full Time Drive II MCA & B.tech (CSE, CS, CSD, IT & EC) II 2025- 2026 Batch. (1)