Computer Application and Data Processing-Network (ISS (Statistical Services) Statistics Paper I (New 2016 MCQ Pattern)): Questions 1 - 3 of 58

Access detailed explanations (illustrated with images and videos) to 472 questions. Access all new questions we will add tracking exam-pattern and syllabus changes. Subscription can be renewed yearly absolutely FREE! View Sample Explanation or View Features.

Rs. 300.00 or

How to register?

Question number: 1

» Computer Application and Data Processing » Network » Firewall

Edit
MCQ▾

Question

What is the countermeasure for IP address spoofing?

Choices

Choice (4) Response

a.

By enforcing a rule that the first fragment of a packet must contain a predefined minimum amount of the transport header.

b.

To discard packets with inside source address if the packet arrives on an external interface.

c.

To discard all packets that do not analyze the source routing information.

d.

Question does not provide sufficient data or is vague

Question number: 2

» Computer Application and Data Processing » Network » Internet

Edit
MCQ▾

Question

A virus cannot enter in your computer in following way:

Choices

Choice (4) Response

a.

While installing a program you choose option for an automatic install.

b.

While browsing the Internet, an Internet advertisement or window appears that says your computer is infected or that a unique plug-in is required and you accept the prompt.

c.

While opening an e-mail attachments that contain code from unknown sender.

d.

None of the above

Question number: 3

» Computer Application and Data Processing » Network » Firewall

Edit
MCQ▾

Question

Which of the following is/are Common characteristics of a bastion host?

Choices

Choice (4) Response

a.

The bastion host hardware platform executes a secure version of its operating system, making it a hardened system.

b.

Each proxy is configured to support all standard application’s command set.

c.

The bastion host does not require additional authentication before a user is allowed access to the proxy services.

d.

All of the above

Developed by: