1.A ……
is a set of information that is exchanged between a client and web browser and
a web server during HTTP transaction.
A. InfoB. ClientinfoC. CookieD. None
2.
Simple cabling method, known as the …….. topology allows 30 computers on a
maximum cable length about 600 feet.
A. RingB. BusC. StarD. Mesh
3.The
………. Layer is responsible for resolving access to the shared media or
resources.
A. PhysicalB. NetworkC. MAC sublayerD. Session
4.A
firewall is installed at the point where internal network and untrusted
external network meet which is also known as ……….
A. Check pointB. Meeting pointC. Secure poitD. None
5………..is
used to carry traffic of one protocol over network that does not support that
protocol directly.
A. TunnelingB. TransferingC. TrafficingD. Switching
6.In
……..mode the authentication header is inserted immediately after the IP header.
A. TransportB. TunnelC. AuthenticationD. None
7.The
…… is a collection of protocols designed by Internet Engineering Task
Force(IETF)to provide security for a packet at the Network layer.
A. NetSecB. IPSecC. PacketSecD. None
8…….
Mode is used when the either end of a security association is gateway.
A. TunnelB. TransportC. EncapsulatingD. Gateway
9…..clause
is an additional filter that is applied to the result.
A. SelectB. HavingC. Group byD. Order by
10……….contains
data assisting day to day activities of the organization.
A. Control databaseB. Operational dbC. Sequential dbD. None
Social Plugin