The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
What is handshaking in the area of network communication ?
A.
Two technicians Closing a deal
B.
2 modems connecting
C.
2 modems exchanging inforamtion
Correct Answer
C. 2 modems exchanging inforamtion
Explanation Handshaking in the area of network communication refers to the process where two modems exchange information to establish a connection. It involves a series of signals and protocols to ensure that both devices are ready and compatible to communicate with each other. This exchange of information allows the modems to negotiate parameters such as data transfer speed and error control methods. Once the handshaking process is completed successfully, the modems can begin transmitting data between each other.
Rate this question:
2.
Incremental backup is the fastest backup procedure.
What is the definition of a call back in communication?
A.
You dial 1471 and the menu gives you the option to press 3 to call back.
B.
The server determines whether your user name and password are correct if they are correct, the server disconnects and then returns the call.
C.
A speaker phone were you have to ring the security guards to get permision to enter the building.
Correct Answer
B. The server determines whether your user name and password are correct if they are correct, the server disconnects and then returns the call.
Explanation A callback in communication refers to the process where the server verifies the user's credentials (username and password) and if they are correct, the server disconnects the call and then initiates a return call. This process ensures that only authorized users are granted access to the communication system.
Rate this question:
4.
A diskless network in networking is a?
A.
A personal computer
B.
A computer with storage space in the hard drive
C.
Computer network with a central storage server
Correct Answer
C. Computer network with a central storage server
Explanation A diskless network refers to a computer network where the client computers do not have local storage capabilities. Instead, they rely on a central storage server to access and store data. This setup allows for easier management and maintenance of the network since all data is stored in one location. It also allows for better security as sensitive information is stored centrally and can be controlled more effectively.
Rate this question:
5.
In media what do they use to back up files?
A.
1 T Flash hard drive
B.
Computer harddrive
C.
Computer server system
Correct Answer
A. 1 T Flash hard drive
Explanation In media, they use a 1 T Flash hard drive to back up files. This type of hard drive offers a large storage capacity, making it suitable for storing media files such as videos, photos, and audio recordings. Additionally, flash drives are portable and easy to use, allowing media professionals to transfer and access their files conveniently.
Rate this question:
6.
Audit Logs is when the server automatically tracks every action you take including any document you have opened or changed. This keeps a record of any actions you have taken in each session you have logged in?
A.
True
B.
False
Correct Answer
A. True
Explanation Audit Logs are indeed a feature that automatically tracks every action taken by a user on a server, including opening or changing documents. This feature helps to keep a record of all the actions performed by a user in each session they have logged in. Therefore, the statement "True" accurately describes the concept of Audit Logs.
Rate this question:
7.
Which type of organizations use a Virtual private network?
A.
Colleges, Large Corperations,Governmentel institutes
B.
Airports, Railway Stations, churches, masjids
Correct Answer
A. Colleges, Large Corperations,Governmentel institutes
Explanation Virtual private networks (VPNs) are commonly used by colleges, large corporations, and government institutes. These organizations often need to securely connect their networks and allow remote access to their internal resources. VPNs provide a secure and encrypted connection over a public network, such as the internet, ensuring that sensitive data remains protected. This is particularly important for organizations that deal with confidential information, such as educational institutions, big companies, and government agencies. By using a VPN, these organizations can establish a private and secure network, enabling their employees and authorized individuals to access resources remotely while maintaining data confidentiality.
Rate this question:
8.
How would you make a secure password so no one can hack into your account?
A.
Letters
B.
Numbers
C.
Letters and numbers mixed
Correct Answer
C. Letters and numbers mixed
Explanation Mixing letters and numbers in a password creates a stronger and more secure combination. Including both letters and numbers increases the complexity of the password, making it harder for hackers to guess or crack. Using only letters or only numbers would make the password easier to guess or break through various hacking techniques such as brute-force attacks or dictionary attacks. Therefore, combining letters and numbers provides an added layer of security to protect against unauthorized access to an account.
Rate this question:
9.
Level access depends on your status at work for example if you are a receptionist would you have access to the security room?
A.
Yes
B.
Maybe
C.
Never
Correct Answer
C. Never
Explanation The correct answer is "never" because as a receptionist, you would not typically have access to the security room. The security room is usually restricted to authorized personnel only, such as security guards or managers. The receptionist's role is mainly focused on greeting visitors, answering phone calls, and performing administrative tasks, rather than having access to sensitive areas like the security room.
Rate this question:
10.
If you are an IT Technician you have access to all the hardware, software, and documents?
A.
True
B.
False
Correct Answer
B. False
Explanation As an IT Technician, you may have access to a wide range of hardware, software, and documents related to your job responsibilities. However, it does not necessarily mean that you have access to all the hardware, software, and documents in an organization. Access privileges are typically assigned based on job roles, security clearance, and need-to-know basis. So, while you may have access to a significant amount of resources, it is unlikely that you have access to everything in the organization. Therefore, the statement is false.
Rate this question:
11.
If your password was mixed letters and numbers would it be strong?
A.
Yes
B.
No
Correct Answer
A. Yes
Explanation Yes, a password that includes a combination of letters and numbers would be considered strong. This is because using a mix of alphanumeric characters increases the complexity of the password, making it harder for hackers to guess or crack. Including both letters and numbers provides a larger pool of possible combinations, making it more difficult for brute-force attacks or dictionary-based hacking methods to succeed. Therefore, using a password that includes mixed letters and numbers enhances its strength and adds an extra layer of security.
Rate this question:
12.
Incremental Backup is a backup procedure that is commonly used in large organizations. it only saves the documents you change or create on that day?
A.
true
B.
False
Correct Answer
A. true
Explanation Incremental Backup is a backup procedure commonly used in large organizations. It only saves the documents that have been changed or created on a specific day. This means that instead of backing up the entire system every time, only the new or modified files are backed up, resulting in faster backup times and reduced storage requirements.
Rate this question:
13.
Handshaking... is when?
A.
The client sends the server a request for a certificate so they start to connect
B.
The server is sending a reuest to talk.
C.
The server is pinging the network to talk
Correct Answer
A. The client sends the server a request for a certificate so they start to connect
Explanation Handshaking is a process where two entities, in this case, the client and the server, establish a connection and exchange information before starting communication. In this scenario, the client initiates the handshaking process by sending a request for a certificate to the server. This request indicates the client's intention to connect with the server and also allows for the establishment of a secure connection by verifying the server's identity through the certificate.
Rate this question:
14.
In networking the advantage of call back is immediately after hanging up the server sends a message to say why the call was terminated. Which one of these is true?
A.
The call-back feature instructs the remote access server to disconnect after confirmation and then to call you back
B.
The remote sever confirms your call and then rings you back
Correct Answer
A. The call-back feature instructs the remote access server to disconnect after confirmation and then to call you back
Explanation The call-back feature in networking allows the remote access server to disconnect after receiving confirmation from the user and then initiate a call back to the user. This ensures that the server can provide a message explaining the reason for the call termination immediately after the call is ended. This feature provides an advantage by allowing the user to receive feedback and information about the termination of the call.
Rate this question:
15.
A diskless network is a very secure server, no one has access to the network unless they have an account. A diskless network is?
A.
A computer server with no access to it
B.
A server with access to it
C.
A server with ability to add a pen drive to it or add a disc to it
Correct Answer
B. A server with access to it
Explanation A diskless network is a server with access to it. This means that users or clients can connect to the network and access the server's resources, such as files, applications, and services, as long as they have the necessary credentials or account. The statement mentioned in the question about the network being secure and requiring an account to access further emphasizes the idea that the server is accessible to authorized individuals.
Rate this question:
16.
VPN ( Virtual Private Network) is a secure network that gets used by people who are working from home or on the way home on the train. this is because
A.
Its a very secure tunnel network and uses vpn because it is encrypted
B.
Because vpn allowes access to their home area and you can download your work
Correct Answer
A. Its a very secure tunnel network and uses vpn because it is encrypted
Explanation The correct answer is that VPN is a very secure tunnel network and uses encryption. This means that the data transmitted through the VPN is protected and cannot be easily intercepted or accessed by unauthorized individuals. VPNs are commonly used by people working remotely or on public networks to ensure the security and privacy of their communications. Additionally, VPNs allow users to access their home network and download their work files securely.
Rate this question:
17.
To make a network safe which security software would you use?
Correct Answer AVG Norton Internet Security Microsoft ForeFront
Explanation To make a network safe, one would use security software such as AVG, Norton Internet Security, or Microsoft ForeFront. These software programs are specifically designed to protect networks from various threats, including viruses, malware, and unauthorized access. They provide features like real-time scanning, firewall protection, and advanced threat detection, ensuring the network's safety and preventing potential security breaches.
Rate this question:
18.
The callback number is set up in advance which means that the user cannot connect from any location, only a trusted, registered line.
A.
Correct
B.
Wrong
C.
Dont know
Correct Answer
A. Correct
Explanation The callback number being set up in advance implies that it is predetermined and cannot be changed or accessed from any location. This suggests that the user can only connect to the system using a specific, registered line that has been authorized and trusted.
Rate this question:
19.
There are many protocols and methods used in the management of VPNs, the primary purpose of these is to prevent.
A.
Snooping
B.
Packet sniffing
C.
Thefing information
Correct Answer
A. Snooping
Explanation The correct answer is "snooping." In the context of VPN management, snooping refers to the unauthorized access or interception of data transmitted over the VPN. The protocols and methods used in VPN management aim to prevent snooping by encrypting the data and ensuring secure communication between the client and the server. By doing so, they protect the confidentiality and privacy of the transmitted information, making it difficult for any unauthorized party to snoop or access the data.
Rate this question:
20.
What is Intruder detection?
A.
Alarm when someone is breaking into your house
B.
A detection software that detects fluctuations in the users usage
C.
A spyware prevention programme
Correct Answer
C. A spyware prevention programme
Explanation Intruder detection refers to a spyware prevention program, which is designed to identify and prevent unauthorized access or intrusion into a computer system. It detects and blocks any malicious software or spyware that may attempt to gain access to sensitive information or compromise the system's security. This program actively monitors the system for any suspicious activities or unauthorized attempts, providing an additional layer of protection against potential threats.
Rate this question:
21.
What us a tracking cookie?
A.
A biscuit that follows the user
B.
A file that records when the user accesses a particular website
C.
A file that records every action the user executes
Correct Answer
C. A file that records every action the user executes
Explanation A tracking cookie is a file that records every action the user executes. This type of cookie is used by websites to track user behavior, such as the pages visited, links clicked, and actions taken on the site. It helps websites gather data about user preferences and interests, which can be used for targeted advertising and personalized user experiences.
Rate this question:
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.