Computer Application and Data Processing-Network [ISS (Statistical Services) Statistics Paper I]: Questions 53 - 57 of 294
Choose Programs:
📹 Video Course 2024 (60 Lectures [26 hrs : 20 mins]): Offline Support
Rs. 160.00 -OR-
1 Month Validity (Multiple Devices)
Preview All LecturesDetails
🎓 Study Material (589 Notes): 2024-2025 Syllabus
Rs. 650.00 -OR-
3 Year Validity (Multiple Devices)
Topic-wise Notes & SampleDetails
🎯 1595 MCQs (& PYQs) with Full Explanations (2024-2025 Exam)
Rs. 500.00 -OR-
3 Year Validity (Multiple Devices)
CoverageDetailsSample Explanation
Help me Choose & Register (Watch Video) Already Subscribed?
Question 53
Question MCQ▾
Ethernet in metropolitan area network (MAN) can be used for
Choices
Choice (4) | Response | |
---|---|---|
a. | Ethernet over MPLS | |
b. | IPv4 | |
c. | (CSMA/CD) technology to detect collisions | |
d. | All a., b. and c. are correct |
Question 54
Question MCQ▾
Worm can be of following type:
Choices
Choice (4) | Response | |
---|---|---|
a. | Mail worm. | |
b. | Impure worm. | |
c. | None of the above | |
d. | All of the above |
Question 55
Question MCQ▾
What does Port Scanners do?
Choices
Choice (4) | Response | |
---|---|---|
a. | It can TELNET into an SMTP port and simply type in a bogus Email message | |
b. | It send messages to all the TCP and UDP ports on a remote computer to see if any of them are open and waiting to receive a call. | |
c. | It monitor network traffic for usernames and passwords, subsequently making these available to the hacker. | |
d. | IT run in background mode on a machine, encrypting thousands of different words and comparing these to the encrypted passwords stored on the machine |
Question 56
Question MCQ▾
Full form of VPN is
Choices
Choice (4) | Response | |
---|---|---|
a. | Varied public network | |
b. | Virtual private network | |
c. | Virtual public network | |
d. | Varied private network |
Question 57
Question MCQ▾
Macro Viruses are different from boot sector and file viruses in which of the following way?
Choices
Choice (4) | Response | |
---|---|---|
a. | Macro viruses infect data files rather than program files. | |
b. | Macro viruses cannot be emailed. | |
c. | Macro viruses infect program files rather than data files. | |
d. | Macro viruses spread slower than other kind of virus. |