UNIT 1 - BASICS OF COMPUTER NETWORKS AND OPERATING SYSTEM
UNIT 1 - BASICS OF COMPUTER NETWORKS AND OPERATING SYSTEM
TOPIC 1 : LAN
A) Router
B) Hub
C) Switch
D) Both B and C
A) Bus
B) Star
C) Ring
D) Mesh
Answer: B) Star
A) HTTP
B) TCP/IP
C) SMTP
D) POP3
Answer: B) TCP/IP
6. What does a DHCP server do in a LAN?
A) Fiber optic
B) Ethernet (Cat5e, Cat6)
C) HDMI
D) Coaxial
A) 10 meters
B) 100 meters
C) 500 meters
D) 1,000 meters
A) Switch
B) Repeater
C) Hub
D) Router
Answer: B) Repeater
Answer: B) 1 Gbps
15. Which of the following protocols is used to assign dynamic IP addresses in a LAN?
A) HTTP
B) DHCP
C) DNS
D) FTP
Answer: B) DHCP
16. Which layer of the OSI model is responsible for transmitting raw data bits over a physical medium?
A) Application Layer
B) Transport Layer
C) Network Layer
D) Physical Layer
Answer: D) Physical Layer
A) To assign IP addresses
B) To broadcast data to all connected devices
C) To route data between different networks
D) To filter and forward data
A) To assign IP addresses
B) To block unauthorized access to the network
C) To route data packets between LANs
D) To provide wireless access
A) 802.3
B) 802.11b
C) 802.15
D) 802.5
Answer: B) 802.11b
20. What is the maximum data transfer rate of Fast Ethernet (100Base-T)?
A) 10 Mbps
B) 100 Mbps
C) 1 Gbps
D) 10 Gbps
21. Which device is used to filter network traffic based on IP addresses in a LAN?
A) Hub
B) Switch
C) Firewall
D) Repeater
Answer: C) Firewall
22. What is the function of a DNS server in a LAN?
A) To assign IP addresses
B) To resolve domain names into IP addresses
C) To route traffic between networks
D) To block spam emails
A) To assign IP addresses
B) To connect devices to a network
C) To manage network traffic
D) To filter network data
A) FTP
B) TCP/IP
C) SMB
D) SSH
Answer: C) SMB
25. What is the maximum distance of a wireless LAN (Wi-Fi) connection in a typical office environment?
A) 50 meters
B) 100 meters
C) 500 meters
D) 1,000 meters
Answer: A) 50 meters
A) Private IP addresses
B) Dynamic IP addresses
C) Public IP addresses
D) IPv4 addresses only
30. Which of the following is NOT a common type of wireless network security?
A) WPA2
B) WEP
C) DNS
D) WPA
Answer: C) DNS
31. Which of these devices is used to combine multiple Ethernet connections into one in a LAN?
A) Switch
B) Hub
C) Bridge
D) Router
Answer: A) Switch
A) IP Address
B) MAC Address
C) Port Address
D) DNS Address
A) Coaxial
B) Fiber optic
C) Ethernet (Cat 5e)
D) Ethernet (Cat 6)
A) 100 Mbps
B) 1 Gbps
C) 10 Gbps
D) 100 Gbps
Answer: C) 10 Gbps
36. What is the primary difference between a hub and a switch in a LAN?
Answer: B) A hub broadcasts data to all devices, while a switch sends data only to the intended device
37. Which of the following is NOT a common type of network topology in a LAN?
A) Star
B) Ring
C) Tree
D) Cloud
Answer: D) Cloud
38. Which of the following is the default port number for HTTP in a LAN?
A) 25
B) 80
C) 443
D) 21
Answer: B) 80
40. Which of the following technologies is used for short-range wireless communication in LANs?
A) Wi-Fi
B) Bluetooth
C) Zigbee
D) 4G LTE
Answer: B) Bluetooth
A) 0.0.0.0 to 255.255.255.255
B) 10.0.0.0 to 10.255.255.255
C) 172.16.0.0 to 172.31.255.255
D) 192.168.0.0 to 192.168.255.255
42. What is the main role of an access point (AP) in a wireless LAN?
A) SMTP
B) SSH
C) HTTP
D) IMAP
Answer: B) SSH
45. Which of the following standards is used for Gigabit Ethernet in a LAN?
A) 802.3u
B) 802.3z
C) 802.3ab
D) 802.11g
Answer: C) 802.3ab
46. What is the maximum data rate supported by 802.11n Wi-Fi in a LAN?
A) 54 Mbps
B) 100 Mbps
C) 600 Mbps
D) 1 Gbps
48. Which layer of the OSI model is responsible for reliable data transfer in a LAN?
A) Application Layer
B) Transport Layer
C) Network Layer
D) Data Link Layer
50. What is the main advantage of fiber optic cables over copper cables in LANs?
A) Lower cost
B) Higher bandwidth and longer range
C) Easier to install
D) Better resistance to interference
TOPIC 2 : WAN
a) Switch
b) Hub
c) Router
d) Bridge
Answer: c) Router
a) Bluetooth
b) Ethernet
c) Fiber Optic
d) USB
a) Home Wi-Fi
b) LAN in a school
c) The internet
d) Bluetooth network
a) VPN
b) LAN
c) WLAN
d) MAN
Answer: a) VPN
a) Lower cost
b) Complex setup
c) Easier to secure
d) Limited scalability
12. Which of the following technologies is typically used to establish a WAN link?
a) Wi-Fi
b) Ethernet
c) DSL
d) USB
Answer: c) DSL
a) HTTP
b) SMTP
c) PPP
d) FTP
Answer: c) PPP
a) FTP
b) VPN
c) HTTP
d) DHCP
Answer: b) VPN
16. Which of the following can be used to increase the reliability of a WAN?
a) Bandwidth throttling
b) Redundant communication links
c) Limited routing protocols
d) Restricting external access
a) Satellite link
b) Fiber optic cable
c) Coaxial cable
d) Bluetooth
Answer: d) Bluetooth
20. Which of these is a benefit of using a WAN for communication?
23. Which of the following is used to create a virtual WAN over a public network?
a) DSL
b) VPN
c) Bluetooth
d) Ethernet
Answer: b) VPN
24. Which protocol is used to connect devices in a WAN over a telephone line?
a) HTTP
b) POP3
c) PPP
d) SMTP
Answer: c) PPP
25. Which of these is an example of a WAN service provider?
a) AT&T
b) Wi-Fi hotspot
c) Bluetooth network
d) Ethernet cable company
Answer: a) AT&T
28. Which of the following WAN technologies provides internet access to remote locations?
a) DSL
b) Wi-Fi
c) Bluetooth
d) VPN
Answer: a) DSL
31. Which WAN technology uses a dedicated leased line between two points?
a) Frame Relay
b) ATM
c) MPLS
d) Private Line
32. Which type of WAN technology is considered reliable and flexible for connecting branch offices?
a) DSL
b) VPN
c) Ethernet
d) MPLS
Answer: d) MPLS
a) Microwave transmission
b) Satellite
c) Ethernet
d) Coaxial cable
Answer: c) Ethernet
35. Which of the following is the most common technology for internet-based WAN?
a) Wi-Fi
b) Satellite internet
c) Ethernet
d) Fiber optics
36. Which of the following WAN technologies supports the highest speeds?
a) ISDN
b) DSL
c) Fiber Optic
d) Wi-Fi
a) High latency
b) Low cost
c) High speed
d) Unlimited data transfer
41. Which of the following WAN technologies offers high-speed internet connections for remote locations?
a) DSL
b) VPN
c) MPLS
d) Ethernet
Answer: a) DSL
43. Which of the following WAN technologies is commonly used for businesses that need secure
connections to remote locations?
a) Frame Relay
b) VPN
c) ISDN
d) DSL
Answer: b) VPN
44. Which of these is used to connect local area networks over a large geographic area in a WAN?
a) Fiber optics
b) Ethernet cables
c) Satellite
d) Wi-Fi
a) Ethernet WAN
b) VPN WAN
c) MPLS WAN
d) DSL WAN
a) The internet
b) A private office network
c) A company LAN
d) A closed circuit network
a) Router
b) Switch
c) Hub
d) Repeater
Answer: a) Router
50. Which of the following WAN technologies is used to connect networks across different cities or
countries?
a) Satellite
b) LAN
c) Wi-Fi
d) Ethernet
Answer: a) Satellite
TOPIC 3 : WIRELESS NETWORKS
A. Wireless Fidelity
B. Wide Frequency
C. Wireless Frequency
D. None of the above
Answer: A. Wireless Fidelity
A. 802.3
B. 802.11
C. 802.15
D. 802.16
Answer: B. 802.11
A. WEP
B. WPA
C. WPA2
D. WPA3
Answer: D. WPA3
A. 5-10 meters
B. 30-50 meters
C. 100-150 meters
D. 200-300 meters
Answer: B. 30-50 meters
A. To provide a firewall
B. To connect devices using Ethernet
C. To distribute internet wirelessly
D. To encrypt data packets
Answer: C. To distribute internet wirelessly
A. Router
B. Switch
C. Wi-Fi Repeater
D. Hub
Answer: C. Wi-Fi Repeater
A. Bluetooth
B. Wi-Fi Direct
C. Zigbee
D. NFC
Answer: B. Wi-Fi Direct
A. Bus
B. Star
C. Ring
D. Mesh
Answer: B. Star
14. Which wireless standard supports the fastest data transfer rates?
A. 802.11g
B. 802.11n
C. 802.11ac
D. 802.11ax
Answer: D. 802.11ax
16. Which protocol is used for secure data transmission in wireless networks?
A. FTP
B. HTTP
C. HTTPS
D. DNS
Answer: C. HTTPS
A. Infrared
B. Radio Waves
C. Wi-Fi signals
D. Microwaves
Answer: B. Radio Waves
19. Which frequency band provides better range but lower speed?
A. 2.4 GHz
B. 5 GHz
C. 6 GHz
D. 1 GHz
Answer: A. 2.4 GHz
A. A centralized network
B. A peer-to-peer network
C. A satellite network
D. A 5G network
Answer: B. A peer-to-peer network
A. Application Layer
B. Physical Layer
C. Network Layer
D. Data Link Layer
Answer: B. Physical Layer
22. What is the term for interference caused by multiple overlapping wireless signals?
A. Noise
B. Co-channel Interference
C. Signal Jamming
D. Cross-talk
Answer: B. Co-channel Interference
A. To manage bandwidth
B. To improve speed
C. To enhance security
D. To expand coverage
Answer: C. To enhance security
A. Internet of Traffic
B. Input Output Technology
C. Internet of Things
D. Intelligent Online Transfer
Answer: C. Internet of Things
A. To improve speed
B. To manage IP addresses
C. To protect data from unauthorized access
D. To reduce network traffic
Answer: C. To protect data from unauthorized access
27. Which wireless technology is used for very short-range communication, such as contactless payments?
A. Wi-Fi
B. NFC
C. Zigbee
D. Bluetooth
Answer: B. NFC
A. 802.11b
B. 802.11ac
C. 802.3
D. 802.11n
Answer: C. 802.3
30. What is the primary advantage of the 5 GHz band over 2.4 GHz?
A. Better range
B. Higher speed and less interference
C. Compatibility with older devices
D. Stronger signal strength
Answer: B. Higher speed and less interference
A. A device’s IP address
B. A unique identifier for network devices
C. A network security protocol
D. A type of encryption
Answer: B. A unique identifier for network devices
A. Signal strength
B. Network latency
C. Data transfer rate
D. Encryption level
Answer: B. Network latency
A. 1.3 Gbps
B. 4.8 Gbps
C. 9.6 Gbps
D. 6.9 Gbps
Answer: C. 9.6 Gbps
35. What is the term for a situation where multiple wireless networks interfere with each other?
A. Spectrum Congestion
B. Signal Attenuation
C. Noise
D. Signal Reflection
Answer: A. Spectrum Congestion
A. Wi-Fi
B. Bluetooth
C. Zigbee
D. LTE
Answer: C. Zigbee
A. Improve range
B. Provide authentication and access control
C. Enhance speed
D. Increase signal strength
Answer: B. Provide authentication and access control
A. 1-5 meters
B. 10 meters
C. 50 meters
D. 100 meters
Answer: B. 10 meters
A. WPA
B. IPsec
C. WEP
D. WPA2
Answer: B. IPsec
A. Long-Term Evolution
B. Local Transmission Extension
C. Low Transmission Efficiency
D. Limited Transmission Exchange
Answer: A. Long-Term Evolution
TOPIC 4 :WLAN
A. 802.15
B. 802.11
C. 802.16
D. 802.3
Answer: B. 802.11
3. What is the primary purpose of a WLAN?
A. To encrypt data
B. To provide wireless connectivity to devices
C. To manage bandwidth
D. To distribute IP addresses
Answer: B. To provide wireless connectivity to devices
A. Mobility
B. Easy installation
C. High latency
D. Scalability
Answer: C. High latency
A. FTP
B. HTTP
C. WPA2/WPA3
D. SMTP
Answer: C. WPA2/WPA3
A. Bus
B. Mesh
C. Star
D. Ring
Answer: C. Star
A. 3.2 Gbps
B. 6.9 Gbps
C. 9.6 Gbps
D. 12 Gbps
Answer: C. 9.6 Gbps
A. To encrypt data
B. To uniquely identify a device
C. To determine signal strength
D. To assign IP addresses
Answer: B. To uniquely identify a device
A. 802.11g
B. 802.11a
C. 802.11n
D. 802.11b
Answer: C. 802.11n
A. 2.4 GHz
B. 5 GHz
C. 6 GHz
D. 1 GHz
Answer: A. 2.4 GHz
A. Signal strength
B. The actual data transfer rate
C. The number of devices connected
D. The range of the network
Answer: B. The actual data transfer rate
A. HTTPS
B. WPA
C. FTP
D. Telnet
Answer: B. WPA
26. What is the maximum range of a typical indoor WLAN?
A. 10-20 meters
B. 30-50 meters
C. 100-200 meters
D. 300-500 meters
Answer: B. 30-50 meters
A. Wireless Fidelity
B. Wireless Internet
C. It does not officially stand for anything
D. Wireless Interface
Answer: C. It does not officially stand for anything
A. Assign IP addresses
B. Encrypt network traffic
C. Identify the wireless network
D. Extend the network range
Answer: C. Identify the wireless network
A. 802.11g
B. 802.11b
C. 802.11a
D. 802.11n
Answer: C. 802.11a
A. WEP
B. WPA3
C. WPA
D. Open Network
Answer: B. WPA3
A. Wireless router
B. Wireless repeater
C. Wireless adapter
D. Wireless extender
Answer: A. Wireless router
A. Higher range
B. Simplified encryption
C. Improved efficiency in dense environments
D. Compatibility with older devices
Answer: C. Improved efficiency in dense environments
34. What is the main disadvantage of using the 5 GHz band in WLANs?
A. Higher latency
B. Shorter range
C. Incompatibility with older devices
D. Slower data rates
Answer: B. Shorter range
A. Quality of Security
B. Quality of Service
C. Quick Operational Speed
D. Queue Optimization System
Answer: B. Quality of Service
A. A security protocol
B. A web page requiring user authentication
C. A method of encryption
D. A device that connects to a router
Answer: B. A web page requiring user authentication
A. Encrypting traffic
B. Reducing interference between networks
C. Assigning IP addresses
D. Improving range
Answer: B. Reducing interference between networks
A. TKIP
B. AES
C. WEP
D. SSL
Answer: B. AES
A. Wireless adapter
B. Repeater
C. Wireless bridge
D. Access point
Answer: C. Wireless bridge
TOPIC 5 : WI-FI
A. Wireless Fidelity
B. It does not officially stand for anything
C. Wireless Interface
D. Wireless Frequency
Answer: B. It does not officially stand for anything
A. IEEE
B. Wi-Fi Alliance
C. IETF
D. ICANN
Answer: B. Wi-Fi Alliance
A. 802.3
B. 802.11
C. 802.15
D. 802.16
Answer: B. 802.11
A. 4.8 Gbps
B. 9.6 Gbps
C. 1 Gbps
D. 6 Gbps
Answer: B. 9.6 Gbps
A. Static IP
B. Dynamic IP
C. Private IP
D. Public IP
Answer: B. Dynamic IP
A. Security Service ID
B. Service Set Identifier
C. Signal Strength Identification
D. Secure System Identifier
Answer: B. Service Set Identifier
A. 5-10 meters
B. 20-50 meters
C. 60-80 meters
D. 100-150 meters
Answer: B. 20-50 meters
11. What does a Wi-Fi repeater do?
A. TKIP
B. AES
C. DES
D. RSA
Answer: B. AES
A. 802.11g
B. 802.11b
C. 802.11n
D. 802.11a
Answer: C. 802.11n
A. Short range
B. Susceptibility to interference
C. Incompatibility with modern devices
D. High energy consumption
Answer: B. Susceptibility to interference
A. 802.11ac
B. 802.11n
C. 802.11ax
D. 802.11g
Answer: C. 802.11ax
A. 1.3 Gbps
B. 6.9 Gbps
C. 9.6 Gbps
D. 3.2 Gbps
Answer: B. 6.9 Gbps
25. What is the primary advantage of the 5 GHz Wi-Fi band over 2.4 GHz?
A. Better range
B. Higher speeds
C. Greater device compatibility
D. Lower power consumption
Answer: B. Higher speeds
A. Simpler setup
B. Enhanced security
C. Faster speeds
D. Greater range
Answer: B. Enhanced security
A. Light interference
B. Magnetic interference
C. Radio frequency interference
D. Physical obstruction interference
Answer: C. Radio frequency interference
A. 40 MHz
B. 80 MHz
C. 160 MHz
D. 320 MHz
Answer: C. 160 MHz
A. Improves encryption
B. Prioritizes traffic for better performance
C. Extends network range
D. Simplifies network setup
Answer: B. Prioritizes traffic for better performance
38. Which layer of the OSI model does Wi-Fi operate on?
A. 100 Mbps
B. 600 Mbps
C. 1 Gbps
D. 300 Mbps
Answer: B. 600 Mbps
A. A VoIP service
B. Making calls over a Wi-Fi network
C. A feature of mesh networks
D. A secure calling protocol
Answer: B. Making calls over a Wi-Fi network
A. 2.4 GHz
B. 5 GHz
C. 6 GHz
D. 900 MHz
Answer: B. 5 GHz
A. A security protocol
B. The transmission of the network name
C. A method for encrypting traffic
D. A feature for mesh networking
Answer: B. The transmission of the network name
A. 802.11ac
B. 802.11n
C. 802.11ah (HaLow)
D. 802.11ax
Answer: C. 802.11ah (HaLow)
49. What is the maximum number of devices that can connect to a Wi-Fi router?
A. 20
B. 50
C. It varies depending on the router
D. Unlimited
Answer: C. It varies depending on the router
A. 10-50 meters
B. 100-200 meters
C. 300-500 meters
D. 1 km
Answer: B. 100-200 meters
A) Oscilloscope
B) Cable Tester
C) Spectrum Analyzer
D) Multimeter
Answer: B) Cable Tester
A) Continuity Test
B) Signal Strength Test
C) Speed Test
D) Bandwidth Test
Answer: A) Continuity Test
A) 50 meters
B) 100 meters
C) 200 meters
D) 300 meters
Answer: B) 100 meters
7. Which device in a LAN environment is responsible for forwarding data to the correct destination?
A) Hub
B) Switch
C) Router
D) Modem
Answer: B) Switch
8. Which of the following is used to test network performance and latency in a LAN?
A) Ping Test
B) Cable Tester
C) Multimeter
D) Protocol Analyzer
Answer: A) Ping Test
10. Which type of LAN cable is most commonly used in modern networks?
A) Coaxial Cable
B) Fiber Optic Cable
C) Unshielded Twisted Pair (UTP) Cable
D) Shielded Twisted Pair (STP) Cable
Answer: C) Unshielded Twisted Pair (UTP) Cable
A) Internet Protocol
B) Internet Point
C) Internal Protocol
D) Integrated Packet
Answer: A) Internet Protocol
12. In LAN testing, what does the term "attenuation" refer to?
A) Signal loss
B) Signal strength
C) Signal interference
D) Signal clarity
Answer: A) Signal loss
13. What is the typical voltage used in Ethernet cables for signaling?
A) 3V
B) 5V
C) 12V
D) 48V
Answer: D) 48V
14. Which device would you use to check the signal quality of a LAN connection?
A) Cable Tester
B) Network Analyzer
C) Oscilloscope
D) Multimeter
Answer: B) Network Analyzer
15. What does a "green" LED light on a network interface card (NIC) typically indicate?
A) Cable failure
B) Link activity
C) Signal interference
D) Power failure
Answer: B) Link activity
17. Which of the following is used to test for a “split pair” in Ethernet cables?
A) Tone Generator
B) Cable Tester
C) Network Analyzer
D) Multimeter
Answer: B) Cable Tester
18. What kind of testing does a Time Domain Reflectometer (TDR) perform?
19. Which layer of the OSI model is responsible for data link testing in a LAN?
A) Physical Layer
B) Data Link Layer
C) Network Layer
D) Transport Layer
Answer: B) Data Link Layer
20. What is the maximum transmission distance of a single-mode fiber optic cable?
A) 10 km
B) 50 km
C) 100 km
D) 500 km
Answer: B) 50 km
A) Star Topology
B) Bus Topology
C) Ring Topology
D) Mesh Topology
Answer: A) Star Topology
A) Network Analyzer
B) Cable Tester
C) Oscilloscope
D) Multimeter
Answer: A) Network Analyzer
A) Electrical equipment
B) Poor cable shielding
C) Distance between devices
D) All of the above
Answer: D) All of the above
28. What type of testing would be done using a "bit error rate" in a LAN?
30. Which of the following is the best practice when testing LAN cables for connectivity?
31. What type of cable is used for long-distance network connections in LANs?
A) Coaxial Cable
B) Fiber Optic Cable
C) UTP Cable
D) STP Cable
Answer: B) Fiber Optic Cable
A) Cable continuity
B) Network latency
C) Signal strength
D) Router configuration
Answer: B) Network latency
34. Which of the following tools would you use to check the health of network cables?
A) Cable Tester
B) Spectrum Analyzer
C) Oscilloscope
D) Protocol Analyzer
Answer: A) Cable Tester
35. In a fiber optic connection, what is used to test the power levels?
A) Light Meter
B) Cable Tester
C) Signal Generator
D) Network Analyzer
Answer: A) Light Meter
36. Which of the following tests is used to determine the speed of a LAN?
A) Ping Test
B) Speed Test
C) Cable Continuity Test
D) Signal Interference Test
Answer: B) Speed Test
37. Which of the following devices helps in analyzing data packets in a LAN?
A) Hub
B) Switch
C) Protocol Analyzer
D) Router
Answer: C) Protocol Analyzer
39. What is the primary purpose of using a TDR (Time Domain Reflectometer) in LAN testing?
40. In which of the following cases would you use a loopback adapter in LAN testing?
41. Which cable type is used for shielding against electromagnetic interference (EMI) in a LAN?
42. Which of the following protocols is used to test connectivity between devices in a LAN?
A) HTTP
B) FTP
C) ICMP
D) TCP
Answer: C) ICMP
45. Which of the following devices is typically used for diagnosing network issues in a LAN?
A) Cable Tester
B) Protocol Analyzer
C) Router
D) Hub
Answer: B) Protocol Analyzer
47. Which type of fiber optic cable is used for short-range connections in LANs?
A) Single-mode fiber
B) Multi-mode fiber
C) STP fiber
D) UTP fiber
Answer: B) Multi-mode fiber
A) Signal loss
B) Data packet conflicts on the network
C) Voltage fluctuation
D) Network speed
Answer: B) Data packet conflicts on the network
50. In which situation would a "fiber optic" cable be most suitable for LAN testing?
3. What type of proxy server works by forwarding requests from clients to the internet?
A) Transparent Proxy
B) Reverse Proxy
C) Forward Proxy
D) Open Proxy
Answer: C) Forward Proxy
A) Caching content
B) Encrypting communication
C) Filtering web traffic
D) Blocking external devices
Answer: D) Blocking external devices
5. A proxy server can help improve the performance of a LAN by performing which function?
A) Reducing bandwidth
B) Caching frequently accessed content
C) Encrypting communication
D) Blocking external connections
Answer: B) Caching frequently accessed content
6. Which of the following types of proxy servers is used to provide access to a LAN from the internet?
A) Reverse Proxy
B) Forward Proxy
C) Transparent Proxy
D) Open Proxy
Answer: A) Reverse Proxy
7. Which protocol does a proxy server typically use to communicate with clients?
A) HTTP
B) FTP
C) TCP/IP
D) SNMP
Answer: A) HTTP
A) User credentials
B) Web pages and files
C) Network IP addresses
D) Email messages
Answer: B) Web pages and files
9. Which of the following benefits does a proxy server provide in terms of security?
10. In a proxy server setup, which device typically handles the client’s request for a web page?
A) Client machine
B) Proxy server
C) Web server
D) DNS server
Answer: B) Proxy server
11. A proxy server configured to allow only specific websites is an example of what kind of function?
A) Web caching
B) Web filtering
C) Load balancing
D) Bandwidth management
Answer: B) Web filtering
13. Which proxy server type would you use to provide load balancing for multiple web servers?
A) Forward Proxy
B) Reverse Proxy
C) Transparent Proxy
D) Open Proxy
Answer: B) Reverse Proxy
15. A reverse proxy server sits between the internet and which of the following?
A) DNS server
B) Web server
C) Client machines
D) Switches
Answer: B) Web server
16. In which scenario would a proxy server be used for content filtering?
18. Which of the following is an advantage of using a proxy server for web traffic?
19. A proxy server that only works with HTTP requests is known as what?
A) FTP Proxy
B) HTTP Proxy
C) SOCKS Proxy
D) DNS Proxy
Answer: B) HTTP Proxy
21. What is one advantage of using a proxy server for web traffic caching?
23. Which type of proxy server would you use if you wanted to provide an additional layer of security
between your LAN and the internet?
A) Forward Proxy
B) Transparent Proxy
C) Reverse Proxy
D) Open Proxy
Answer: C) Reverse Proxy
24. Which of the following best describes the caching function of a proxy server?
27. Which of the following is an example of a proxy server feature aimed at improving bandwidth
management?
28. What type of proxy server is typically used to provide a single point of contact for multiple web
servers in a LAN?
A) Transparent Proxy
B) Forward Proxy
C) Reverse Proxy
D) Open Proxy
Answer: C) Reverse Proxy
30. What type of proxy server is typically used in online anonymity services?
A) Transparent Proxy
B) Anonymous Proxy
C) Reverse Proxy
D) SOCKS Proxy
Answer: B) Anonymous Proxy
32. What does a proxy server need to modify in order to forward web traffic properly?
33. What is one use case for a proxy server in a corporate LAN environment?
A) Providing direct access to the internet for all devices
B) Filtering and blocking unwanted websites
C) Encrypting all web traffic
D) Storing personal user data
Answer: B) Filtering and blocking unwanted websites
34. In a proxy server setup, which of the following components can be secured by encrypting traffic?
A) Client-to-server connections
B) Proxy-to-web server connections
C) Only the DNS queries
D) All of the above
Answer: B) Proxy-to-web server connections
A) Transparent Proxy
B) Reverse Proxy
C) Forward Proxy
D) Open Proxy
Answer: A) Transparent Proxy
36. What is the main advantage of using a proxy server for security in a network?
38. What kind of proxy server is commonly used in corporate environments to distribute web traffic
efficiently across multiple servers?
A) Forward Proxy
B) Reverse Proxy
C) Transparent Proxy
D) SOCKS Proxy
Answer: B) Reverse Proxy
39. Which of the following is an important security function of a proxy server in a LAN?
40. In which scenario would a proxy server be used for filtering content based on the type of data?
43. What is the role of a proxy server in preventing a Distributed Denial of Service (DDoS) attack?
44. Which of the following protocols does a proxy server use to communicate with clients?
A) HTTPS
B) HTTP
C) FTP
D) SNMP
Answer: B) HTTP
45. What type of proxy is used to forward requests from a client inside a corporate LAN to the internet?
A) Reverse Proxy
B) Forward Proxy
C) Transparent Proxy
D) Web Proxy
Answer: B) Forward Proxy
46. What does a proxy server do when a client requests a cached web page?
47. What is the main difference between a forward proxy and a reverse proxy?
A) A forward proxy is used to provide access to the internet, while a reverse proxy is used to protect web
servers.
B) A forward proxy is used for content filtering, while a reverse proxy is for caching.
C) A forward proxy hides a user’s IP address, while a reverse proxy hides the web server’s IP address.
D) There is no difference between them.
Answer: A) A forward proxy is used to provide access to the internet, while a reverse proxy is used to protect
web servers.
48. What kind of proxy server can be used to provide secure communication between clients and a web
server over the internet?
A) Forward Proxy
B) Reverse Proxy
C) Transparent Proxy
D) Open Proxy
Answer: B) Reverse Proxy
50. In a corporate environment, why would you use a proxy server for content filtering?
A) 5
B) 7
C) 9
D) 10
Answer: B) 7
3. Which layer of the OSI model is responsible for error detection and correction?
A) Application Layer
B) Presentation Layer
C) Transport Layer
D) Data Link Layer
Answer: D) Data Link Layer
4. Which of the following is the main function of the Physical Layer in the OSI model?
A) Network Layer
B) Transport Layer
C) Data Link Layer
D) Physical Layer
Answer: A) Network Layer
7. Which layer of the OSI model provides encryption and decryption of data?
A) Application Layer
B) Presentation Layer
C) Session Layer
D) Transport Layer
Answer: B) Presentation Layer
A) Network Layer
B) Data Link Layer
C) Transport Layer
D) Physical Layer
Answer: A) Network Layer
9. Which of the following is the main function of the Session Layer in the OSI model?
10. Which OSI layer provides network services to the application layer?
A) Transport Layer
B) Network Layer
C) Session Layer
D) Presentation Layer
Answer: A) Transport Layer
11. Which layer is responsible for ensuring reliable communication between two devices over a network?
A) Application Layer
B) Network Layer
C) Transport Layer
D) Data Link Layer
Answer: C) Transport Layer
12. Which layer in the OSI model is responsible for data compression and decompression?
A) Application Layer
B) Presentation Layer
C) Transport Layer
D) Network Layer
Answer: B) Presentation Layer
13. Which OSI layer provides the interface between the application and the network?
A) Network Layer
B) Application Layer
C) Transport Layer
D) Data Link Layer
Answer: B) Application Layer
14. Which of the following is not a function of the Data Link Layer?
15. Which OSI layer ensures that data is delivered without errors, in the correct sequence, and without
duplication?
A) Network Layer
B) Transport Layer
C) Data Link Layer
D) Application Layer
Answer: B) Transport Layer
16. Which layer of the OSI model is responsible for segmentation and reassembly of data?
18. The OSI model defines how many layers for communication?
A) 5
B) 6
C) 7
D) 8
Answer: C) 7
19. Which of the following devices operates at the OSI model's Physical Layer?
A) Router
B) Switch
C) Hub
D) Gateway
Answer: C) Hub
20. In the OSI model, what is the role of the Network Layer?
A) Transport Layer
B) Network Layer
C) Data Link Layer
D) Physical Layer
Answer: B) Network Layer
22. What is the primary function of the Application Layer in the OSI model?
A) Encrypt data
B) Interface between the application and the network
C) Route data packets
D) Provide end-to-end error correction
Answer: B) Interface between the application and the network
23. Which OSI layer is responsible for creating a reliable end-to-end communication path?
A) Transport Layer
B) Network Layer
C) Application Layer
D) Session Layer
Answer: A) Transport Layer
24. Which of the following is NOT a responsibility of the Presentation Layer in the OSI model?
A) Data translation
B) Compression
C) Encryption
D) Routing
Answer: D) Routing
25. What is the main responsibility of the Transport Layer in the OSI model?
26. Which OSI layer is involved in converting digital signals to analog signals for transmission over
physical media?
A) Network Layer
B) Transport Layer
C) Physical Layer
D) Data Link Layer
Answer: C) Physical Layer
27. What is the purpose of the Session Layer in the OSI model?
A) It manages the establishment, maintenance, and termination of communication between devices.
B) It defines how data should be transmitted physically.
C) It ensures reliable data transfer.
D) It handles end-to-end error recovery.
Answer: A) It manages the establishment, maintenance, and termination of communication between devices.
28. Which of the following is an example of a device that operates at the Data Link Layer?
A) Hub
B) Switch
C) Router
D) Bridge
Answer: B) Switch
29. Which OSI layer is responsible for the logical addressing of packets?
A) Network Layer
B) Data Link Layer
C) Application Layer
D) Transport Layer
Answer: A) Network Layer
30. The OSI model's Transport Layer is responsible for which of the following?
A) Error checking
B) Routing
C) Data encryption
D) Establishing communication sessions
Answer: A) Error checking
31. Which OSI layer determines how data is transmitted over the network?
A) Network Layer
B) Data Link Layer
C) Physical Layer
D) Transport Layer
Answer: C) Physical Layer
A) Network Layer
B) Data Link Layer
C) Transport Layer
D) Application Layer
Answer: A) Network Layer
33. Which of the following functions does the Network Layer perform?
A) Error detection
B) Data segmentation
C) Routing and forwarding of packets
D) Data encryption
Answer: C) Routing and forwarding of packets
A) Raw data
B) Segmented data
C) Routed data
D) Encrypted data
Answer: B) Segmented data
36. In the OSI model, which layer defines the physical characteristics of the network medium?
A) Application Layer
B) Physical Layer
C) Data Link Layer
D) Transport Layer
Answer: B) Physical Layer
37. What does the Data Link Layer use to address devices on the network?
A) IP addresses
B) MAC addresses
C) Port numbers
D) URLs
Answer: B) MAC addresses
38. What function does the Transport Layer perform in the OSI model?
40. Which of the following is a common example of a device that operates at the OSI's Network Layer?
A) Switch
B) Hub
C) Router
D) Bridge
Answer: C) Router
A) Encryption
B) Addressing
C) Connection establishment, maintenance, and termination
D) Data flow control
Answer: C) Connection establishment, maintenance, and termination
42. What is the role of the Physical Layer in the OSI model?
A) Establishing, maintaining, and terminating communication sessions
B) Converting data into signals for transmission over the network medium
C) Routing and forwarding data packets
D) Providing error-free delivery of data
Answer: B) Converting data into signals for transmission over the network medium
A) Network Layer
B) Data Link Layer
C) Transport Layer
D) Application Layer
Answer: A) Network Layer
A) Network Layer
B) Presentation Layer
C) Data Link Layer
D) Transport Layer
Answer: B) Presentation Layer
45. Which OSI layer is responsible for addressing and delivering data to specific devices?
46. What does the Application Layer use to access the network?
A) Ports
B) IP addresses
C) DNS
D) MAC addresses
Answer: A) Ports
A) Session Layer
B) Presentation Layer
C) Network Layer
D) Transport Layer
Answer: B) Presentation Layer
49. Which OSI layer is primarily responsible for routing data across the network?
A) Transport Layer
B) Network Layer
C) Data Link Layer
D) Physical Layer
Answer: B) Network Layer
50. Which OSI layer is responsible for creating and terminating sessions between applications?
A) Application Layer
B) Transport Layer
C) Session Layer
D) Network Layer
Answer: C) Session Layer
A) Application firewall
B) Physical firewall
C) Cloud firewall
D) Software firewall
Answer: A) Application firewall
A) HTTP
B) HTTPS
C) FTP
D) SNMP
Answer: B) HTTPS
A) Phishing
B) Spoofing
C) Flooding a network with excessive traffic
D) Data theft
Answer: C) Flooding a network with excessive traffic
11. What type of attack involves a hacker intercepting and altering communication between two parties?
A) Man-in-the-middle attack
B) Denial-of-service attack
C) Phishing attack
D) Spoofing attack
Answer: A) Man-in-the-middle attack
A) Encryption
B) Compression
C) Fragmentation
D) Tunneling
Answer: A) Encryption
17. Which security measure prevents unauthorized access by verifying the identity of users or devices?
A) Encryption
B) Authentication
C) Authorization
D) Auditing
Answer: B) Authentication
19. Which type of security is responsible for ensuring that only authorized users can access data?
A) Integrity
B) Availability
C) Confidentiality
D) Authentication
Answer: C) Confidentiality
A) Firewall
B) Virus
C) Router
D) Switch
Answer: B) Virus
25. Which of the following protocols is commonly used to secure email communication?
A) SMTP
B) IMAP
C) POP3
D) S/MIME
Answer: D) S/MIME
27. Which of the following describes the principle of "least privilege" in network security?
32. Which of the following is a key component of a security operations center (SOC)?
34. Which security measure helps to protect against SQL injection attacks?
A) Input validation
B) Using encryption algorithms
C) Monitoring network traffic
D) Applying firewall rules
Answer: A) Input validation
35. What is the main difference between symmetric and asymmetric encryption?
36. Which security practice involves regularly checking for software updates and vulnerabilities?
A) Patch management
B) Network segmentation
C) Incident response
D) Disaster recovery
Answer: A) Patch management
37. What does a password manager help users to do?
39. What type of malware is specifically designed to replicate itself and spread to other devices?
A) Worm
B) Trojan horse
C) Ransomware
D) Spyware
Answer: A) Worm
43. What type of security vulnerability occurs when unauthorized users gain access to a network or
system?
A) Phishing
B) Data leakage
C) Unauthorized access
D) Data integrity breach
Answer: C) Unauthorized access
44. Which type of malware encrypts a victim’s files and demands a ransom for decryption?
A) Virus
B) Worm
C) Ransomware
D) Trojan horse
Answer: C) Ransomware
47. Which of the following is the primary benefit of using two-factor authentication (2FA)?
49. What does the term "data integrity" refer to in network security?
Topic 10 : Basic Working Knowledge of Windows / Linux Operating Systems including Open source
operating systems
A) CMD
B) PowerShell
C) Bash
D) Zsh
Answer: C) Bash
A) Microsoft Windows
B) macOS
C) Ubuntu
D) iOS
Answer: C) Ubuntu
4. In Windows, which of the following file systems is commonly used for hard drives?
A) EXT4
B) FAT32
C) NTFS
D) APFS
Answer: C) NTFS
A) dir
B) ls
C) list
D) show
Answer: B) ls
A) move
B) cd
C) dir
D) edit
Answer: B) cd
A) WordPad
B) Notepad
C) Vim
D) Emacs
Answer: C) Vim
11. In Linux, which command is used to display the current working directory?
A) pwd
B) dir
C) ls
D) cd
Answer: A) pwd
A) .exe
B) .bat
C) .msi
D) .doc
Answer: A) .exe
13. Which of the following Linux commands is used to install software packages on Ubuntu?
A) yum
B) pacman
C) apt-get
D) dnf
Answer: C) apt-get
14. Which of the following commands in Windows is used to check the system's IP address?
A) ipconfig
B) netstat
C) ping
D) tracert
Answer: A) ipconfig
15. What is the command in Linux to display the system's disk usage?
A) lsblk
B) df
C) du
D) disk
Answer: B) df
17. Which Windows tool is used for disk partitioning and management?
A) Disk Management
B) File Explorer
C) Task Manager
D) Registry Editor
Answer: A) Disk Management
18. Which of the following is the default file system for Linux?
A) NTFS
B) EXT4
C) HFS+
D) FAT32
Answer: B) EXT4
19. In Linux, which directory contains system binary files for essential commands?
A) /bin
B) /usr
C) /home
D) /etc
Answer: A) /bin
21. Which of the following file extensions is associated with Linux shell scripts?
A) .exe
B) .sh
C) .bat
D) .ps1
Answer: B) .sh
A) Windows 10
B) Windows XP
C) Windows 7
D) Ubuntu
Answer: D) Ubuntu
23. In Windows, what does the 'Task Manager' allow users to do?
24. Which Linux distribution is widely used for servers and workstations?
A) Windows Server
B) Ubuntu
C) Red Hat Enterprise Linux (RHEL)
D) macOS
Answer: C) Red Hat Enterprise Linux (RHEL)
A) /etc/passwd
B) /etc/shadow
C) /etc/group
D) /home/user
Answer: A) /etc/passwd
26. What is the primary difference between a Windows server and a Windows desktop OS?
A) del
B) erase
C) rm
D) delete
Answer: C) rm
28. What does the 'ping' command do in both Windows and Linux?
30. In Windows, which of the following tools is used to check and repair disk errors?
A) Disk Management
B) Check Disk (chkdsk)
C) Disk Cleanup
D) Task Manager
Answer: B) Check Disk (chkdsk)
31. Which of the following commands in Linux is used to display network information?
A) netstat
B) ifconfig
C) ipconfig
D) traceroute
Answer: B) ifconfig
32. Which Linux command allows you to check the current user?
A) user
B) whoami
C) id
D) current_user
Answer: B) whoami
33. Which feature of Linux allows the system to provide access to multiple users at the same time?
A) File system
B) Multitasking
C) Multi-user capabilities
D) Networking
Answer: C) Multi-user capabilities
34. In Windows, which feature allows a user to recover lost or damaged files?
A) System Restore
B) Backup and Restore
C) File History
D) Disk Management
Answer: C) File History
A) ls
B) dir
C) show
D) list
Answer: B) dir
36. What is the name of the package manager for Red Hat-based Linux distributions?
A) apt-get
B) pacman
C) dnf
D) yum
Answer: D) yum
A) To delete files
B) To display disk space usage
C) To show running processes
D) To list files in a directory
Answer: B) To display disk space usage
39. Which of the following is a Linux-based operating system designed for cloud infrastructure?
A) Windows Server
B) Ubuntu Server
C) CentOS
D) Red Hat Enterprise Linux
Answer: B) Ubuntu Server
A) Windows 95
B) Windows XP
C) Windows 8
D) Windows 10
Answer: A) Windows 95
A) netstat
B) ipconfig
C) tracert
D) ping
Answer: B) ipconfig
42. Which file contains configuration information for system settings in Linux?
A) /etc/fstab
B) /etc/passwd
C) /etc/bashrc
D) /etc/hostname
Answer: A) /etc/fstab
A) Open-source code
B) Multi-user support
C) Multi-tasking capabilities
D) Limited software support
Answer: D) Limited software support
45. Which Windows utility can be used to view and kill processes?
A) Disk Management
B) Task Manager
C) File Explorer
D) Control Panel
Answer: B) Task Manager
47. In Windows, which of the following is the default directory for user files?
A) C:\Program Files
B) C:\Users
C) C:\Windows
D) C:\System32
Answer: B) C:\Users
49. In Linux, which file system is commonly used for a root partition?
A) NTFS
B) EXT4
C) FAT32
D) HFS+
Answer: B) EXT4
50. In Windows, which of the following is used to configure system settings and preferences?
A) Control Panel
B) Task Manager
C) File Explorer
D) Command Prompt
Answer: A) Control Panel