Computer Application and Data Processing-Network (ISS (Statistical Services) Statistics Paper I (New 2016 MCQ Pattern)): Questions 22 - 27 of 58

Get 1 year subscription: Access detailed explanations (illustrated with images and videos) to 469 questions. Access all new questions we will add tracking exam-pattern and syllabus changes. View Sample Explanation or View Features.

Rs. 300.00 or

Question number: 22

» Computer Application and Data Processing » Network » Computer Security

MCQ▾

Question

What is the situation in which services or data become unavailable, unusable or destroyed?

Choices

Choice (4) Response

a.

Fabrication

b.

Interception

c.

Modification

d.

Interruption

Question number: 23

» Computer Application and Data Processing » Network » Computer Security

MCQ▾

Question

Which of the following is/are example of public key encryption?

Choices

Choice (4) Response

a.

MD5 hashing

b.

Data Encryption Standard (DES)

c.

Rivest-Shamir-Adleman (RSA)

d.

None of the above

Question number: 24

» Computer Application and Data Processing » Network » Computer Security

MCQ▾

Question

Regarding Secret key encryption, following statement is correct:

Choices

Choice (4) Response

a.

Only sender has a secret key.

b.

Only receiver has a secret key.

c.

Both a. and b. are correct

d.

Question does not provide sufficient data or is vague

Question number: 25

» Computer Application and Data Processing » Network » Internet

MCQ▾

Question

Ethernet in metropolitan area network (MAN) can be used for

Choices

Choice (4) Response

a.

IPv4

b.

Ethernet over MPLS

c.

(CSMA/CD) technology to detect collisions

d.

All a. , b. and c. are correct

Question number: 26

» Computer Application and Data Processing » Network » Virus

MCQ▾

Question

Worm can be of following type:

Choices

Choice (4) Response

a.

Mail worm.

b.

Impure worm.

c.

All of the above

d.

Question does not provide sufficient data or is vague

Question number: 27

» Computer Application and Data Processing » Network » Computer Security

MCQ▾

Question

What does Port Scanners do?

Choices

Choice (4) Response

a.

It can TELNET into an SMTP port and simply type in a bogus Email message

b.

IT run in background mode on a machine, encrypting thousands of different words and comparing these to the encrypted passwords stored on the machine

c.

It monitor network traffic for usernames and passwords, subsequently making these available to the hacker.

d.

It send messages to all the TCP and UDP ports on a remote computer to see if any of them are open and waiting to receive a call.

f Page
Sign In