Module 7 : Server configuration, Back-up server network security
Quiz
- Which of following are the web services
excepts?- Jetty
- Tornado Apache
- Tomcat
- Blue Griffin
- Which of the following allows to view a
webpage?- MS-Office
- Web server
- Operating system
- Internet Browser
- Which protocol are not used by internet?
- IP
- TCP
- BSNL
- HTTP
- Which of the following are not medium of email
view?- Internet
- L2CAP
- Intranet
- Extranet
- What is the easiest way of communication
now a days?- Fax
- Letter
- Telegram
- Which of these should be avoided in an email?
- Subject line
- Re-reading
- Before sending
editing - Wrong email address
- What is meant by roll back of transactions?
- Update the
transaction - Recover from
previous transaction - Delete old records
- Repeat a transaction
- Update the
- Which of the following is not a proper state
of transaction?- Partially committed
- Aborted
- Partially aborted
- Committed
- In which state the database should be for
backup?- Online state
- Off-line state
- Restoring state
- Deleting state
- What is the another name of remote backup
site?- Primary site
- Secondary site
- Tertiary site
- Construction site
- Which recovery system covers media
recovery and failure recovery?- Transaction recovery
- Database recovery
- System recovery
- Value recovery
- Which is an essential part of any backup
system?- Filter
- Recovery
- Security
- Scalability
- Why would a hacker use a proxy server?
- To hide malicious
activity on the
network - To create stronger
connections with the
target - To create ghost
server on the network - To obtain a remote
access connection
- To hide malicious
- What is the most important activity in system
hacking?- Information gateway
- Crack-up password
- Facilities provided
- Cover-up tracks
- Where WPA2 security is used?
- Ethernet
- Bluetooth
- Wi-fi
- Computer
- What is the work of network layer firewall?
- Frame filter
- Capacitor filter
- Band pass filter
- Packet filter
- Which portion of LAN management software
restricts allows and records user activities?- Configuration
management - Security management
- Performance
management - File management
- Configuration
- Which of the following is not a strong
security protocols?- HTTPS
- SSL
- SMTP
- SFTP
- What is the full form of SFTP?
- Secure File Transfer
Protocol - Secured File
Transfer Protocol - Secure Folder
Transfer Protocol - Secure File
Transferring Protocol
- Secure File Transfer
- Which protocol ensures the integrity and
Which protocol ensures the integrity and security of data that are passing over a
network?- Firewall
- Networks-security
protocols - Antivirus Pen
- testing tools
- Which protocol is used for encrypting
(coding) data at network level?- S/MIME
- HTTPS
- SMTP
- IP sec
- What is the full form of SIP?
- Session Initiation
Protocol - Secured Initiation
Protocol - Secure Initiation
Protocol - Session Integration
Protocol
- Session Initiation
No comments:
Post a Comment
If you have any doubts, please let me know