Networking :: All Aptitude Test ::

1.In ________, we combine signals from different sources to fit into a larger bandwidth.?
A. spread spectrum
B. line coding
C. block coding
D. spread spectrum

2._______ is designed to be used in wireless applications in which stations must be able to share the medium without interception by an eavesdropper and without being subject to jamming from a malicious
A. Spread spectrum
B. Multiplexing
C. Modulation
D. Spread spectrum

3.The ______ technique expands the bandwidth of a signal by replacing each data bit with n bits.
A. FDM
B. DSSS
C. FHSS
D. FDM

4.DMT is a modulation technique that combines elements of _______ and _______.?
A. FDM; TDM
B. QDM; QAM
C. FDM; QAM
D. FDM; TDM

5.A band is always equivalent to ...............?
A. a byte
B. a bit
C. 100 bits
D. a byte

6..................... type of multiplexing are used by transport layer to improve transmission efficiency.?
A. upward
B. downward
C. horizontal
D. upward

7.Which of the following delay is faced by the packet in travelling from one end system to another ?
A. Propagation delay
B. Queuing delay
C. Transmission delay
D. Propagation delay

8.Which of these is a standard interface for serial data transmission?
A. ASCII
B. RS232C
C. 2
D. ASCII

9."Parity bits" are used for which of the following purposes?
A. Encryption of data
B. To transmit faster
C. To detect errors
D. Encryption of data

10.Why would a hacker use a proxy server?
A. To create a stronger connection with the target.
B. To create a ghost server on the network.
C. To obtain a remote access connection.
D. To create a stronger connection with the target.

11. What type of symmetric key algorithm using a streaming cipher to encrypt information?
A. RC4
B. Blowfish
C. SHA
D. RC4

12.Which of the following is not a factor in securing the environment against an attack on security?
A. The education of the attac The system configurationker
B. The system configuration
C. The network architecture
D. The education of the attac The system configurationker

13.What type of attack uses a fraudulent server with a relay address?
A. NTLM
B. MITM
C. NetBIOS
D. NTLM

14.What port is used to connect to the Active Directory in Windows 2000?
A. 80
B. 445
C. 139
D. 80

15. To hide information inside a picture, what technology is used?
A. Rootkits
B. Bitmapping
C. Steganography
D. Rootkits

16. Which phase of hacking performs actual attack on a network or system?
A. Reconnaissance
B. Maintaining Access
C. Scanning
D. Reconnaissance

17.Attempting to gain access to a network using an employee’s credentials is called the _____________ mode of ethical hacking.
A. Local networking
B. Social engineering
C. Physical entry
D. Local networking

18.Which Federal Code applies the consequences of hacking activities that disrupt subway transit systems?
A. Electronic Communications Interception of Oral Communications
B. 18 U.S.C. § 1029
C. Cyber Security Enhancement Act 2002
D. Electronic Communications Interception of Oral Communications

19.Which of the following is not a typical characteristic of an ethical hacker?
A. Excellent knowledge of Windows.
B. Understands the process of exploiting network vulnerabilities.
C. Patience, persistence and perseverance.
D. Excellent knowledge of Windows.

20.What is the proper command to perform an Nmap XMAS scan every 15seconds?
A. nmap -sX -sneaky
B. nmap -sX -paranoid
C. nmap -sX -aggressive
D. nmap -sX -sneaky

21.What type of rootkit will patch, hook, or replace the version of system call in order to hide information?
A. Library level rootkits
B. Kernel level rootkits
C. System level rootkits
D. Library level rootkits

22.What is the purpose of a Denial of Service attack?
A. Exploit a weakness in the TCP/IP stack
B. To execute a Trojan on a system
C. To overload a system so it is no longer operational
D. Exploit a weakness in the TCP/IP stack

23.What are some of the most common vulnerabilities that exist in a network or system?
A. Changing manufacturer, or recommended, settings of a newly installed application.
B. Additional unused features on commercial software packages.
C. Utilizing open source application code
D. Changing manufacturer, or recommended, settings of a newly installed application.

24.What is the sequence of a TCP connection?
A. SYN-ACK-FIN
B. SYN-SYN ACK-ACK
C. SYN-ACK
D. SYN-ACK-FIN

25. What tool can be used to perform SNMP enumeration?
A. DNSlookup
B. Whois
C. Nslookup
D. DNSlookup

26. Which ports should be blocked to prevent null session enumeration?
A. Ports 120 and 445
B. Ports 135 and 136
C. Ports 110 and 137
D. Ports 120 and 445

27.The first phase of hacking an IT system is compromise of which foundation of security?
A. Availability
B. Confidentiality
C. Integrity
D. Availability

28.How is IP address spoofing detected?
A. Installing and configuring a IDS that can read the IP header
B. Comparing the TTL values of the actual and spoofed addresses
C. Implementing a firewall to the network
D. Installing and configuring a IDS that can read the IP header

29.Why would a ping sweep be used?
A. To identify live systems
B. To locate live systems
C. To identify open ports
D. To identify live systems

30.What are the port states determined by Nmap?
A. Active, inactive, standby
B. Open, half-open, closed
C. Open, filtered, unfiltered
D. Active, inactive, standby


Date to Date Current Affairs 2022

PakMCQs.net

Quick Links

GAT Subject



   Computer Science    English Mcqs    Agriculture    

Engineering



   Computer Science    Civil Engineering    

Technical



   Networking    Electronics    Database    

Past Papers



   Model Papers    FPSC Papers