1.
Call back is?
Correct Answer
A. Pre-configured
Explanation
A call back refers to a pre-configured function or method that is passed as an argument to another function. It allows the receiving function to "call back" the pre-configured function at a later time. Therefore, the correct answer is "Pre-configured" as it accurately describes the nature of a call back in programming.
2.
Where is call back used?
Correct Answer
B. On dial-up systems
Explanation
Call back is a feature commonly used in dial-up systems. When a user dials into a remote system, instead of establishing a direct connection, the system disconnects the call and then calls back the user at a predetermined number. This adds an extra layer of security by verifying the identity of the user before granting access to the system. Call back is not typically used on phones or computers, making dial-up systems the most appropriate option for implementing this feature.
3.
What does call back do?
Correct Answer
A. Dial into a network
Explanation
The call back function allows a user to dial into a network. This means that when a user initiates a call back, they are essentially requesting the network to establish a connection with their device. This can be useful in situations where the user is unable to directly connect to the network or needs to establish a secure connection. By dialing into the network, the user can access the resources and services provided by the network.
4.
Why is a call back used?
Correct Answer
A. Dial a network device to call back
Explanation
A call back is used to dial a network device and establish a connection. This can be useful in situations where a network device needs to initiate communication with another device or when a device needs to reconnect after a previous connection was lost. By using a call back, the network device can automatically dial the desired device and establish a connection without requiring manual intervention.
5.
Where is handshaking found?
Correct Answer
B. On WAN systems
Explanation
Handshaking is a process that establishes a connection between two devices or systems. It is commonly used in telecommunication networks to ensure proper communication and synchronization between devices. WAN systems, which stands for Wide Area Network systems, are a type of network that connects multiple local area networks (LANs) over a large geographical area. Handshaking is an essential part of establishing and maintaining connections in WAN systems, making it the correct answer.
6.
How does handshaking work?
Correct Answer
C. Sending Data
Explanation
Handshaking is a process in which two devices establish a communication link. It involves a series of steps to ensure that both devices are ready and able to send and receive data. Sending data is one of the key steps in handshaking. Once the devices have exchanged necessary information and agreed upon the communication parameters, they can start transmitting data. This involves the actual transfer of information from one device to another, allowing for effective communication between the devices.
7.
What is handshaking?
Correct Answer
B. An automated process
Explanation
Handshaking refers to an automated process in which two devices or systems establish a connection or exchange information. It is commonly used in computer networks and communication protocols to ensure that both parties are ready and able to communicate effectively. Handshaking involves a series of predefined steps or signals that allow the devices to synchronize and establish a reliable connection. This process is essential for the successful transmission of data and communication between devices.
8.
Why is handshaking used?
Correct Answer
B. Connect systems over a communication channel
Explanation
Handshaking is used to establish a connection between systems over a communication channel. It allows devices to exchange information and negotiate the terms of their communication. During handshaking, systems send and receive signals to confirm their readiness and compatibility for data transmission. This process ensures that both systems are synchronized and ready to exchange data effectively. Handshaking is essential for reliable communication between devices and is commonly used in various networking protocols and interfaces.
9.
Where are Diskless Networks located?
Correct Answer
C. Server computers
Explanation
Diskless networks are located on server computers. In a diskless network, the client computers do not have their own local storage devices such as hard drives or solid-state drives. Instead, they rely on a central server to provide them with the necessary operating system and software applications. The server stores all the data and programs, which are accessed by the client computers over the network. This setup allows for centralized management, easier software updates, and reduced hardware costs for the client computers.
10.
How does Diskless Networks work?
Correct Answer
B. The server serves requests from both the client computer operating systems
Explanation
Diskless networks work by having a server that serves requests from both the client computer operating systems. This means that the server is responsible for handling and fulfilling requests from the client computers, whether it is retrieving data or performing other tasks. The server acts as a central hub that manages and coordinates the operations of the client computers, allowing them to operate without the need for local storage devices such as hard drives. This centralized approach offers benefits such as easier management and maintenance of the network, as well as improved security and data integrity.
11.
Why is the purpose of Diskless Networks?
Correct Answer
C. Taking control of the clients computer and running it from the server
Explanation
The purpose of Diskless Networks is to take control of the clients' computer and run it from the server. In a diskless network setup, the client computers do not have their own hard disks and instead rely on the server for storage and processing power. This allows for centralized management and control of the client computers, making it easier to deploy updates, manage software, and ensure security.
12.
What is Diskless Networks?
Correct Answer
A. A computer network with a centralized storage server
Explanation
Diskless Networks refer to computer networks that do not have local storage on individual computers or devices. Instead, these networks rely on a centralized storage server to store and manage data. This allows for easier management and maintenance of the network, as well as improved security and data backup capabilities. By eliminating the need for local storage, diskless networks can also reduce costs and simplify the deployment of new devices on the network.
13.
What are Backups – Frequency and types?
Correct Answer
A. A complicated backup system set up on servers
Explanation
The correct answer is "A complicated backup system set up on servers." This suggests that backups are not simple or basic, but rather involve a complex system that is implemented on servers. This implies that the backup process is extensive and comprehensive, ensuring that data is properly protected and preserved.
14.
Why are the purposes of Backups – Frequency and types?
Correct Answer
B. To copy only new data from a system and store it in the server
Explanation
Backups are created to ensure that data is protected and can be recovered in case of any data loss or system failure. The purpose of backups is to copy only new data from a system and store it in the server. This approach is known as incremental backup, where only the changes made since the last backup are saved. It helps to optimize storage space and reduce the time required for backup operations. By copying only new data, backups can be performed more frequently, ensuring that the most up-to-date information is always available for recovery.
15.
What are backups – media to use?
Correct Answer
B. The type of device you are backing up you files to
Explanation
The correct answer is the type of device you are backing up your files to. This answer explains that backups refer to the media or device that is used to store or save copies of files. It implies that backups can be made to various devices such as external hard drives, cloud storage, or even tapes.
16.
Why are the purposes of backups – media to use?
Correct Answer
A. To use them to back up you files safely do that they are not lost
Explanation
The purpose of backups is to use them as a means to safely back up your files so that they are not lost. Backups serve as a form of protection against data loss, ensuring that important files are stored in a secure location. By regularly creating backups, you can prevent the risk of losing valuable information due to hardware failure, accidental deletion, or other unforeseen events.
17.
What are Audit Logs?
Correct Answer
C. Audit logs are files containing a summary of major changes in the database
Explanation
Audit logs are files that store a summary of major changes in the database. These logs provide a record of activities such as modifications, deletions, or additions to the database. By reviewing the audit logs, administrators can track and monitor any unauthorized or suspicious activities, ensuring data integrity and security. Additionally, audit logs can be used for compliance purposes, as they provide a historical trail of actions taken in the database, which can be useful for investigations or audits.
18.
Why is the purpose of Audit Logs?
Correct Answer
B. To keep all the information on any new major updates that have taken place within a database
Explanation
The purpose of Audit Logs is to keep track of any new major updates that have occurred within a database. It allows users to have a record of all the changes made, providing transparency and accountability. This helps in identifying any unauthorized or suspicious activities, ensuring data integrity and security. Audit Logs also serve as a valuable resource for troubleshooting and investigating any issues that may arise within the database.
19.
What is VPN?
Correct Answer
C. A virtual private network
Explanation
A virtual private network (VPN) is a technology that allows users to create a secure and encrypted connection over a public network, such as the internet. It enables users to access and transmit data privately and securely, even when connected to an untrusted network. VPNs are commonly used by individuals and organizations to protect their online privacy, bypass censorship and geolocation restrictions, and secure their sensitive data from unauthorized access.
20.
What is the purpose VPN?
Correct Answer
A. Uses the Internet to provide remote offices with secure access to their organization's network
Explanation
A VPN, or Virtual Private Network, is designed to provide secure access to an organization's network for remote offices. It achieves this by utilizing the Internet as a medium for connecting remote locations securely. This allows employees or users in different locations to access the organization's network resources and information in a secure manner, ensuring confidentiality and data protection. VPNs are commonly used to establish secure connections over public networks, such as the Internet, and enable remote workers to access company resources as if they were physically present in the office.
21.
What is Intruder detection?
Correct Answer
B. Intruder detection is the art of detecting intruders behind attacks
Explanation
Intruder detection refers to the process of identifying and detecting individuals who are attempting unauthorized access or malicious activities within a system or network. It involves monitoring and analyzing various indicators and patterns to identify potential intrusions or attacks. By detecting these intruders, organizations can take appropriate actions to prevent further damage and protect their systems and data from potential threats.
22.
Why is the purpose of Intruder detection?
Correct Answer
C. Intruder detection tries to identify the person behind an attack by analyzing their computational behaviour
Explanation
The purpose of intruder detection is to identify the person behind an attack by analyzing their computational behavior. This means that it focuses on detecting and analyzing the actions and patterns of potential intruders in order to identify and prevent any malicious activity. By understanding the behavior of attackers, organizations can take appropriate measures to protect their systems and data from unauthorized access or damage.
23.
What is Passwords – safety?
Correct Answer
B. Creating a password with 8 characters with at least 1 number in both upper & lowercase
Explanation
Creating a password with 8 characters with at least 1 number in both upper and lowercase is considered safe because it increases the complexity of the password, making it harder for hackers to guess or crack. The combination of upper and lowercase letters along with numbers adds variety and makes the password less predictable. This helps to protect personal information and prevent unauthorized access to devices or accounts.
24.
Why is the purpose of Passwords – safety?
Correct Answer
A. To make you password more secure so that it will be harder to hard or decrypt for hackers
Explanation
Passwords are used for safety purposes in order to make them more secure and difficult for hackers to crack or decrypt. By creating strong and complex passwords, it becomes harder for hackers to gain unauthorized access to personal accounts or sensitive information. This helps in protecting individuals and their computers from potential hacking attempts.
25.
What are Passwords – strengths?
Correct Answer
B. The strengths of your password is measured as Weak, Medium or Strong
Explanation
The given answer explains that passwords are measured in terms of their strength, which can be categorized as weak, medium, or strong. This measurement helps users understand the level of security their password provides. The purpose of this is to assist users in selecting the appropriate type of password to enhance their account security.
26.
Why are the purposes of Passwords – strengths?
Correct Answer
B. To show the user how strong their password is so that they know it will be strong enough to protect their private data and information
Explanation
The purpose of passwords is to show the user how strong their password is so that they know it will be strong enough to protect their private data and information. This is important because a strong password is harder for hackers to decrypt, increasing the security of the user's data. By displaying the strength of the password, users can assess whether their chosen password meets the necessary criteria for protecting their sensitive information.
27.
What are Levels of access, data, and system?
Correct Answer
C. How much rights the administrator has and how much rights the user have
Explanation
The correct answer is "How much rights the administrator has and how much rights the user have." This answer accurately explains that levels of access, data, and system refer to the extent of rights and privileges granted to the administrator and the user. It implies that the levels determine the amount of control and authority each party has over the system and its data.
28.
What is the purpose of Levels of access, data, system?
Correct Answer
B. To stop user from having too much control over their accounts e.g. changing screen resolution
Explanation
The purpose of levels of access, data, system is to stop the user from having too much control over their accounts, such as changing screen resolution. It is designed to limit the user's privileges and prevent them from making unauthorized changes or accessing sensitive information. By implementing levels of access, data, system, organizations can maintain security and ensure that users only have the necessary permissions to perform their tasks without compromising the system's integrity.