Module 7 : Server configuration, Back-up server network security
Module 7 : Server configuration, Back-up server network security
Quiz
Which of following are the web services
excepts?
- Jetty
- Tornado Apache
- Tomcat
- Blue Griffin
Which of the following allows to view a
webpage?
- MS-Office
- Web server
- Operating system
- Internet Browser
Which protocol are not used by internet?
- IP
- TCP
- BSNL
- HTTP
Which of the following are not medium of email
view?
- Internet
- L2CAP
- Intranet
- Extranet
What is the easiest way of communication
now a days?
- Fax
- Letter
- Telegram
- E-mail
Which of these should be avoided in an email?
- Subject line
- Re-reading
- Before sending
editing - Wrong email address
What is meant by roll back of transactions?
- Update the
transaction - Recover from
previous transaction - Delete old records
- Repeat a transaction
Which of the following is not a proper state
of transaction?
- Partially committed
- Aborted
- Partially aborted
- Committed
In which state the database should be for
backup?
- Online state
- Off-line state
- Restoring state
- Deleting state
What is the another name of remote backup
site?
- Primary site
- Secondary site
- Tertiary site
- Construction site
Which recovery system covers media
recovery and failure recovery?
- Transaction recovery
- Database recovery
- System recovery
- Value recovery
Which is an essential part of any backup
system?
- Filter
- Recovery
- Security
- Scalability
Why would a hacker use a proxy server?
- To hide malicious
activity on the
network - To create stronger
connections with the
target - To create ghost
server on the network - To obtain a remote
access connection
What is the most important activity in system
hacking?
- Information gateway
- Crack-up password
- Facilities provided
- Cover-up tracks
Where WPA2 security is used?
- Ethernet
- Bluetooth
- Wi-fi
- Computer
What is the work of network layer firewall?
- Frame filter
- Capacitor filter
- Band pass filter
- Packet filter
Which portion of LAN management software
restricts allows and records user activities?
- Configuration
management - Security management
- Performance
management - File management
Which of the following is not a strong
security protocols?
- HTTPS
- SSL
- SMTP
- SFTP
What is the full form of SFTP?
- Secure File Transfer
Protocol - Secured File
Transfer Protocol - Secure Folder
Transfer Protocol - Secure File
Transferring Protocol
Which protocol ensures the integrity and
Which protocol ensures the integrity and security of data that are passing over a
network?
- Firewall
- Networks-security
protocols - Antivirus Pen
- testing tools
Which protocol is used for encrypting
(coding) data at network level?
- S/MIME
- HTTPS
- SMTP
- IP sec
What is the full form of SIP?
- Session Initiation
Protocol - Secured Initiation
Protocol - Secure Initiation
Protocol - Session Integration
Protocol
Post a Comment
If you have any doubts, please let me know