1.
What is handshaking in the area of network communication ?
Correct Answer
C. 2 modems exchanging inforamtion
Explanation
Handshaking in the area of network communication refers to the process where two modems exchange information to establish a connection. It involves a series of signals and protocols to ensure that both devices are ready and compatible to communicate with each other. This exchange of information allows the modems to negotiate parameters such as data transfer speed and error control methods. Once the handshaking process is completed successfully, the modems can begin transmitting data between each other.
2.
Incremental backup is the fastest backup procedure.
Correct Answer
A. True
Explanation
http://www.proprofs.com/quiz-school/editquiz.php?id=189089
3.
What is the definition of a call back in communication?
Correct Answer
B. The server determines whether your user name and password are correct if they are correct, the server disconnects and then returns the call.
Explanation
A callback in communication refers to the process where the server verifies the user's credentials (username and password) and if they are correct, the server disconnects the call and then initiates a return call. This process ensures that only authorized users are granted access to the communication system.
4.
A diskless network in networking is a?
Correct Answer
C. Computer network with a central storage server
Explanation
A diskless network refers to a computer network where the client computers do not have local storage capabilities. Instead, they rely on a central storage server to access and store data. This setup allows for easier management and maintenance of the network since all data is stored in one location. It also allows for better security as sensitive information is stored centrally and can be controlled more effectively.
5.
In media what do they use to back up files?
Correct Answer
A. 1 T Flash hard drive
Explanation
In media, they use a 1 T Flash hard drive to back up files. This type of hard drive offers a large storage capacity, making it suitable for storing media files such as videos, photos, and audio recordings. Additionally, flash drives are portable and easy to use, allowing media professionals to transfer and access their files conveniently.
6.
Audit Logs is when the server automatically tracks every action you take including any document you have opened or changed. This keeps a record of any actions you have taken in each session you have logged in?
Correct Answer
A. True
Explanation
Audit Logs are indeed a feature that automatically tracks every action taken by a user on a server, including opening or changing documents. This feature helps to keep a record of all the actions performed by a user in each session they have logged in. Therefore, the statement "True" accurately describes the concept of Audit Logs.
7.
Which type of organizations use a Virtual private network?
Correct Answer
A. Colleges, Large Corperations,Governmentel institutes
Explanation
Virtual private networks (VPNs) are commonly used by colleges, large corporations, and government institutes. These organizations often need to securely connect their networks and allow remote access to their internal resources. VPNs provide a secure and encrypted connection over a public network, such as the internet, ensuring that sensitive data remains protected. This is particularly important for organizations that deal with confidential information, such as educational institutions, big companies, and government agencies. By using a VPN, these organizations can establish a private and secure network, enabling their employees and authorized individuals to access resources remotely while maintaining data confidentiality.
8.
How would you make a secure password so no one can hack into your account?
Correct Answer
C. Letters and numbers mixed
Explanation
Mixing letters and numbers in a password creates a stronger and more secure combination. Including both letters and numbers increases the complexity of the password, making it harder for hackers to guess or crack. Using only letters or only numbers would make the password easier to guess or break through various hacking techniques such as brute-force attacks or dictionary attacks. Therefore, combining letters and numbers provides an added layer of security to protect against unauthorized access to an account.
9.
Level access depends on your status at work for example if you are a receptionist would you have access to the security room?
Correct Answer
C. Never
Explanation
The correct answer is "never" because as a receptionist, you would not typically have access to the security room. The security room is usually restricted to authorized personnel only, such as security guards or managers. The receptionist's role is mainly focused on greeting visitors, answering phone calls, and performing administrative tasks, rather than having access to sensitive areas like the security room.
10.
If you are an IT Technician you have access to all the hardware, software, and documents?
Correct Answer
B. False
Explanation
As an IT Technician, you may have access to a wide range of hardware, software, and documents related to your job responsibilities. However, it does not necessarily mean that you have access to all the hardware, software, and documents in an organization. Access privileges are typically assigned based on job roles, security clearance, and need-to-know basis. So, while you may have access to a significant amount of resources, it is unlikely that you have access to everything in the organization. Therefore, the statement is false.
11.
If your password was mixed letters and numbers would it be strong?
Correct Answer
A. Yes
Explanation
Yes, a password that includes a combination of letters and numbers would be considered strong. This is because using a mix of alphanumeric characters increases the complexity of the password, making it harder for hackers to guess or crack. Including both letters and numbers provides a larger pool of possible combinations, making it more difficult for brute-force attacks or dictionary-based hacking methods to succeed. Therefore, using a password that includes mixed letters and numbers enhances its strength and adds an extra layer of security.
12.
Incremental Backup is a backup procedure that is commonly used in large organizations. it only saves the documents you change or create on that day?
Correct Answer
A. true
Explanation
Incremental Backup is a backup procedure commonly used in large organizations. It only saves the documents that have been changed or created on a specific day. This means that instead of backing up the entire system every time, only the new or modified files are backed up, resulting in faster backup times and reduced storage requirements.
13.
Handshaking... is when?
Correct Answer
A. The client sends the server a request for a certificate so they start to connect
Explanation
Handshaking is a process where two entities, in this case, the client and the server, establish a connection and exchange information before starting communication. In this scenario, the client initiates the handshaking process by sending a request for a certificate to the server. This request indicates the client's intention to connect with the server and also allows for the establishment of a secure connection by verifying the server's identity through the certificate.
14.
In networking the advantage of call back is immediately after hanging up the server sends a message to say why the call was terminated. Which one of these is true?
Correct Answer
A. The call-back feature instructs the remote access server to disconnect after confirmation and then to call you back
Explanation
The call-back feature in networking allows the remote access server to disconnect after receiving confirmation from the user and then initiate a call back to the user. This ensures that the server can provide a message explaining the reason for the call termination immediately after the call is ended. This feature provides an advantage by allowing the user to receive feedback and information about the termination of the call.
15.
A diskless network is a very secure server, no one has access to the network unless they have an account. A diskless network is?
Correct Answer
B. A server with access to it
Explanation
A diskless network is a server with access to it. This means that users or clients can connect to the network and access the server's resources, such as files, applications, and services, as long as they have the necessary credentials or account. The statement mentioned in the question about the network being secure and requiring an account to access further emphasizes the idea that the server is accessible to authorized individuals.
16.
VPN ( Virtual Private Network) is a secure network that gets used by people who are working from home or on the way home on the train. this is because
Correct Answer
A. Its a very secure tunnel network and uses vpn because it is encrypted
Explanation
The correct answer is that VPN is a very secure tunnel network and uses encryption. This means that the data transmitted through the VPN is protected and cannot be easily intercepted or accessed by unauthorized individuals. VPNs are commonly used by people working remotely or on public networks to ensure the security and privacy of their communications. Additionally, VPNs allow users to access their home network and download their work files securely.
17.
To make a network safe which security software would you use?
Correct Answer
AVG
Norton Internet Security
Microsoft ForeFront
Explanation
To make a network safe, one would use security software such as AVG, Norton Internet Security, or Microsoft ForeFront. These software programs are specifically designed to protect networks from various threats, including viruses, malware, and unauthorized access. They provide features like real-time scanning, firewall protection, and advanced threat detection, ensuring the network's safety and preventing potential security breaches.
18.
The callback number is set up in advance which means that the user cannot connect from any location, only a trusted, registered line.
Correct Answer
A. Correct
Explanation
The callback number being set up in advance implies that it is predetermined and cannot be changed or accessed from any location. This suggests that the user can only connect to the system using a specific, registered line that has been authorized and trusted.
19.
There are many protocols and methods used in the management of VPNs, the primary purpose of these is to prevent.
Correct Answer
A. Snooping
Explanation
The correct answer is "snooping." In the context of VPN management, snooping refers to the unauthorized access or interception of data transmitted over the VPN. The protocols and methods used in VPN management aim to prevent snooping by encrypting the data and ensuring secure communication between the client and the server. By doing so, they protect the confidentiality and privacy of the transmitted information, making it difficult for any unauthorized party to snoop or access the data.
20.
What is Intruder detection?
Correct Answer
C. A spyware prevention programme
Explanation
Intruder detection refers to a spyware prevention program, which is designed to identify and prevent unauthorized access or intrusion into a computer system. It detects and blocks any malicious software or spyware that may attempt to gain access to sensitive information or compromise the system's security. This program actively monitors the system for any suspicious activities or unauthorized attempts, providing an additional layer of protection against potential threats.
21.
What us a tracking cookie?
Correct Answer
C. A file that records every action the user executes
Explanation
A tracking cookie is a file that records every action the user executes. This type of cookie is used by websites to track user behavior, such as the pages visited, links clicked, and actions taken on the site. It helps websites gather data about user preferences and interests, which can be used for targeted advertising and personalized user experiences.