1.
_________________ partitions the physical hardware and presents this hardware to virtual machines.
Correct Answer
A. pHysical hardware
Explanation
The physical hardware is responsible for providing the underlying resources such as CPU, memory, and storage to virtual machines. It partitions these resources and presents them to the virtual machines, allowing them to run and operate as if they were using dedicated hardware. The physical hardware acts as the foundation for the virtualization environment, enabling the creation and management of virtual machines.
2.
"Access privileges granted to a user, program or process" is called as ________
Correct Answer
B. Authorization
Explanation
Authorization refers to the access privileges that are granted to a user, program, or process. It determines what actions or resources a user is allowed to access or perform within a system. Authentication, on the other hand, is the process of verifying the identity of a user or entity. Confidentiality refers to the protection of sensitive information from unauthorized access. Integrity refers to the assurance that data remains intact and unaltered. Therefore, the correct answer for this question is Authorization.
3.
The concept of using same key for encryption and decryption is called __________
Correct Answer
C. Symmetric key system
Explanation
The concept of using the same key for both encryption and decryption is known as a symmetric key system. In this system, the sender and receiver use the same secret key to encrypt and decrypt the message, ensuring confidentiality. This method is faster and more efficient than asymmetric key systems, where different keys are used for encryption and decryption. Substitution cipher and Caesar cipher are specific examples of symmetric key systems, but the term "symmetric key system" encompasses a broader range of encryption techniques.
4.
In symmetric key systems, ____________ key is used to generate ciphertext and plain text from the message.
Correct Answer
B. XOR
Explanation
In symmetric key systems, the XOR key is used to generate ciphertext and plaintext from the message. XOR (exclusive OR) is a logical operation that outputs true only when the inputs differ. In encryption, the XOR operation is used to combine the message with the key, resulting in the ciphertext. To decrypt the ciphertext and obtain the original message, the same XOR operation is applied using the same key. XOR is commonly used in symmetric key cryptography due to its simplicity and effectiveness in providing confidentiality.
5.
Select the number of levels found in the Domain Name Server (DNS).
Correct Answer
C. 127
Explanation
The number of levels found in the Domain Name Server (DNS) is 127. This is because the DNS follows a hierarchical structure, with each level representing a different domain. The top-level domain (TLD) is the highest level, followed by second-level domains, subdomains, and so on. The DNS can have a maximum of 127 levels, allowing for a wide range of hierarchical organization within the domain system.
6.
Each computer with internet access is assigned __________________
Correct Answer
B. Internet Protocol (IP)
Explanation
Each computer with internet access is assigned an Internet Protocol (IP) address. This address serves as a unique identifier for the computer on the internet. It allows the computer to send and receive data across the network, enabling communication with other devices and access to online resources. The IP address plays a crucial role in routing data packets and ensuring that they reach the intended destination on the internet.
7.
Records maintained in DNS are
Correct Answer(s)
A. A
C. NS
D. MX
Explanation
DNS (Domain Name System) maintains various types of records to provide information about domain names. The A record maps a domain name to its corresponding IP address. The NS record specifies the authoritative name servers for a domain. The MX record identifies the mail servers responsible for accepting incoming emails for a domain. Therefore, the correct answer includes A, NS, and MX as these are all types of records maintained in DNS.
8.
______________ are network devices or software that separates one trusted network from an untrusted network by means of rule-based filtering of network traffic.
Correct Answer
C. Firewalls
Explanation
Firewalls are network devices or software that separate one trusted network from an untrusted network by filtering network traffic based on predefined rules. They act as a barrier between the internal network and the outside world, preventing unauthorized access and protecting the network from potential threats. Firewalls monitor incoming and outgoing traffic, allowing or blocking specific types of data based on the configured rules. They are an essential component of network security, ensuring the integrity and confidentiality of the network.
9.
Parts of windows token are
Correct Answer(s)
A. Identity
B. Access control
D. Privileges
E. Type
Explanation
The given answer includes the different parts of a Windows token. A Windows token is a data structure that contains information about a user or a group, including their identity, access control settings, privileges, and type. The identity part of the token specifies the user or group it represents. The access control part contains the security descriptors that define the permissions granted to the user or group. The privileges part specifies the additional rights that the user or group has. The type part indicates whether the token represents a user or a group.
10.
Thread specific rights have ___________ number of access rights.
Correct Answer
C. 13
Explanation
Thread specific rights have a specific number of access rights that are unique to each thread. These access rights enable the thread to perform specific actions or operations within a program or system. In this case, the correct answer is 13, indicating that thread specific rights have 13 access rights.