CssExqm

CssExqm
100問 • 2年前
  • Eric Riman
  • 通報

    問題一覧

  • 1

    1. What is the primary purpose of Occupational Health and Safety (OHS) in the computer and technology industries? a. Enhancing productivity b. Preventing illness and injury c. Maximizing profits d. Expanding market share

    B

  • 2

    2. In the context of general safety tips, why should removed covers and parts be placed in a safe place during machine maintenance? a. To keep them clean b. To prevent personnel from tripping over them c. To speed up the maintenance process d. To showcase the machine's internal components

    B

  • 3

    3. Why is it important to reinstall all safety shields, guards, labels, and ground wires after servicing a machine? a. To improve the machine's aesthetics b. To comply with safety regulations c. To make the machine look complete d. To reduce the risk of accidents

    B

  • 4

    4. What precaution should be taken regarding clothing when working with machines? a. Wear loose clothing for comfort b. Wear tight clothing to stay warm c. Avoid wearing loose clothing that can be trapped in moving parts d. Wear any clothing as long as it is clean

    C

  • 5

    5. Before opening server/workstation covers, what should be done with power cords, telecommunications systems, networks, and modems? a. Keep them plugged in b. Disconnect them c. Leave them hanging d. Ask for permission from a supervisor

    B

  • 6

    6. What is the first step in a safety inspection guide for identifying potentially unsafe conditions or electrical products? a. Disconnecting power b. Checking for damage c. Powering off the computer d. Testing procedures

    B

  • 7

    7. In electrical safety, what should be done in case of an electrical accident? a. Continue working to fix the issue b. Switch off power and seek medical aid c. Ignore the accident and continue working d. Ask others to handle the situation

    B

  • 8

    8. What is the purpose of a test procedure in the context of computer systems and networks? a. To make the testing process longer b. To confuse technicians c. To guide and ensure thorough testing d. To limit the scope of testing

    C

  • 9

    9. What is the final step in testing a configured computer system and network? a. Running the tests again b. Checking the specification c. Recording test results in a log d. Validating test information

    B

  • 10

    10. What does the ipconfig /all command display in a command prompt? a. Computer name b. IP configuration information c. Installed programs d. Network switch status

    B

  • 11

    11. What should be checked if the Link light is not lit on a computer's RJ-45 port? a. Power supply b. Network switch or router c. Graphics card d. RAM

    B

  • 12

    12. Which command is used to check network configuration in a command prompt? a. config /check b. network /status c. ipconfig /all d. netcheck /config

    C

  • 13

    13. What is the purpose of checking the network configuration in the Start menu? a. To log out of the network b. To verify physical connections c. To troubleshoot network issues d. To change network passwords

    B

  • 14

    14. What is the primary purpose of the ping command in network testing? a. Checking network security b. Testing computer performance c. Verifying network connectivity d. Measuring internet speed

    C

  • 15

    15. What does a successful ping test indicate? a. Network congestion b. Internet speed issues c. Network connectivity d. Server overload

    C

  • 16

    16. What is the purpose of gathering test information in a test procedure? a. To confuse testers b. To run tests required by the procedure c. To speed up the testing process d. To create log files

    B

  • 17

    17. What should be done if a test shows problems according to the test procedure? a. Ignore the problems b. Document the problems and take further action c. Continue testing without addressing the problems d. Switch off the computer immediately

    B

  • 18

    18. What is the role of validating test information in the testing process? a. To create log files b. To confuse testers c. To ensure correct data d. To skip certain tests

    C

  • 19

    19. What does the term "ICT professional" refer to? a. Information and Communication Technology professional b. International Computer Technician c. Intelligent Computer Troubleshooter d. Information Coding and Testing

    A

  • 20

    20. What is the primary goal of testing a computer network? a. Increasing network complexity b. Verifying that the network works as expected c. Reducing the number of connected devices d. Ignoring network issues

    B

  • 21

    21. What is the purpose of Wireless Zero Configuration (WZC) in Windows? a. Manage wired network connections b. Dynamically select wireless networks based on user preferences c. Configure modem settings d. Control router security settings

    B

  • 22

    22. Which wireless standard is considered the most stable and offers the fastest speeds? a. 802.11g b. 802.11n c. 802.11ac d. 802.11b

    B

  • 23

    23. What should you connect to the WAN/Internet Port on a router? a. Computer b. Printer c. Modem d. Switch

    C

  • 24

    24. What is the purpose of MAC address registration with the internet service provider during router setup? a. Enhance router security b. Connect to the LAN c. Authorize router to use the internet service d. Update firmware

    C

  • 25

    25. How can you find the IP address of a router during setup? a. Perform a web search b. Check the router's label or documentation c. Use the default address 192.168.1.1 d. All of the above

    B

  • 26

    26. What is the most common username for accessing router settings? a. admin b. user c. router d. guest

    A

  • 27

    27. What security method is recommended for protecting a wireless network? a. WEP b. WPA c. WPA2-PSK d. None

    C

  • 28

    28. What does SSID stand for in the context of wireless networks? a. System Security Identifier b. Service Set Identifier c. Secure Socket ID d. Signal Strength Indicator

    B

  • 29

    29. After setting up a wireless network, what should you do to enable SSID broadcast? a. Check the box in the router settings b. Restart the router c. Connect a computer via Ethernet d. Update firmware

    A

  • 30

    30. Which type of network connects computers within a limited geographical area, like a building or school? a. WAN b. PAN c. LAN d. MAN

    C

  • 31

    31. What is the primary function of servers in a network? a. Interact with human users b. Provide services to other computers on the network c. Connect to the internet d. Store data locally

    B

  • 32

    32. What device provides a bridge between wireless users and a wired network? a. Modem b. Router c. Switch d. Wireless Access Point (WAP)

    D

  • 33

    33. In a WAN, what is used to connect local and metropolitan networks to global communications networks? a. Routers b. Hubs c. Transoceanic cabling d. Modems

    C

  • 34

    34. What does WAN stand for in networking? a. Wireless Area Network b. Wide Area Network c. Wired Area Network d. Web Area Network

    B

  • 35

    35. What is the purpose of SSID in a wireless network? a. Secure System Identifier b. Signal Strength Indicator c. Service Set Identifier d. System Status Identifier

    C

  • 36

    36. How should you secure a wireless network for maximum protection from hackers? a. WEP b. WPA c. WPA2-PSK d. Open (No security)

    C

  • 37

    37. What is the primary difference between a LAN and a WAN? a. Geographic size b. Number of connected devices c. Speed of connection d. Security protocols

    A

  • 38

    38. What is the purpose of IP addresses in networking? a. Identify network devices b. Provide internet access c. Secure data transmission d. Control network traffic

    A

  • 39

    39. What is the function of a switch hub in network connectivity? a. Connects local and metropolitan networks b. Provides internet access c. Bridges wireless and wired networks d. Connects devices within a LAN

    D

  • 40

    40. What is the first step in setting up a wireless router? a. Connect devices with Ethernet cables b. Power on the router c. Configure router settings d. Purchase a wireless router

    B

  • 41

    41. Which wireless standard is backward compatible with older standards like 802.11g? a. 802.11n b. 802.11ac c. 802.11b d. 802.11ax

    A

  • 42

    42. What is the purpose of connecting a computer via Ethernet during router setup? a. Enhance internet speed b. Provide stability and faster connection c. Configure wireless settings d. Update router firmware

    C

  • 43

    43. Where can you find the MAC address of a router? a. In the router settings b. On the router's label c. In the user manual d. All of the above

    B

  • 44

    44. Which IP address range is reserved for exclusive use in a LAN? a. 192.168.0.0 - 192.168.255.255 b. 172.16.0.0 - 172.31.255.255 c. 10.0.0.0 - 10.255.255.255 d. All of the above

    D

  • 45

    45. What does CAT 5 refer to in network connectivity? a. Router model b. Ethernet cable type c. Wireless security protocol

    B

  • 46

    46. What is the primary function of the Wireless Zero Configuration service in Windows? a. Manage wired connections b. Dynamically select wireless networks c. Configure router settings d. Update firmware

    B

  • 47

    47. What does WZC stand for in the context of Windows wireless configuration? a. Wireless Zone Control b. Wireless Zero Configuration c. WLAN Zone Control d. Wired Zone Configuration

    B

  • 48

    48. Which option is recommended for connecting devices that require a stable and fast connection? a. Wireless b. Ethernet c. Bluetooth d. Infrared

    B

  • 49

    49. What is the primary function of SSID broadcast in wireless networks? a. Enhance security b. Connect devices automatically c. Increase signal strength d. Extend network range

    B

  • 50

    50. What is the role of a wireless access point (WAP) in a network? a. Connects routers to the internet b. Bridges wireless and wired networks c. Provides internet access to devices d. Configures router settings

    B

  • 51

    51. Which security method is considered the most difficult to crack? a. WEP b. WPA c. WPA2-PSK d. No security (Open)

    C

  • 52

    52. What is the purpose of the WAN in networking? a. Connects local devices b. Bridges LAN and WAN c. Connects global networks d. Provides internet access

    C

  • 53

    53. What is the primary function of servers in a network? a. Connect to the internet b. Interact with human users c. Provide services to other computers d. Store local data

    C

  • 54

    54. What is the significance of a unique SSID in a wireless network? a. Enhances signal strength b. Improves security c. Identifies the network to other devices d. Connects to the internet

    C

  • 55

    55. What is the primary purpose of the MAC address in network connectivity? a. Enhance security b. Identify network devices c. Connect to the internet d. Configure router settings

    B

  • 56

    56. What does LAN stand for in networking? a. Local Area Network b. Large Area Network c. Long Area Network d. Limited Area Network

    A

  • 57

    57. What is the function of a switch in network connectivity? a. Connects LAN and WAN b. Bridges wireless and wired networks c. Connects devices within a LAN d. Provides internet access

    C

  • 58

    58. Which security method is considered outdated and less secure? a. WPA2-PSK b. WPA c. WEP d. Open (No security)

    C

  • 59

    59. What is the purpose of SSID broadcast in a wireless network? a. Enhance security b. Connect devices automatically c. Increase signal strength d. Extend network range

    B

  • 60

    60. What does WAN stand for in networking? a. Wireless Area Network b. Wide Area Network c. Wired Area Network d. Web Area Network

    B

  • 61

    61. What is the purpose of IP addresses in networking? a. Identify network devices b. Provide internet access c. Secure data transmission d. Control network traffic

    A

  • 62

    62. What is the first step in setting up a wireless router? a. Connect devices with Ethernet cables b. Power on the router c. Configure router settings d. Purchase a wireless router

    B

  • 63

    63. Which wireless standard is backward compatible with older standards like 802.11g? a. 802.11n b. 802.11ac c. 802.11b d. 802.11ax

    A

  • 64

    64. What is the purpose of connecting a computer via Ethernet during router setup? a. Enhance internet speed b. Provide stability and faster connection c. Configure wireless settings d. Update router firmware

    C

  • 65

    65. Where can you find the MAC address of a router? a. In the router settings b. On the router's label c. In the user manual d. All of the above

    B

  • 66

    66. Which IP address range is reserved for exclusive use in a LAN? a. 192.168.0.0 - 192.168.255.255 b. 172.16.0.0 - 172.31.255.255 c. 10.0.0.0 - 10.255.255.255 d. All of the above

    D

  • 67

    67. What does CAT 5 refer to in network connectivity? a. Router model b. Ethernet cable type c. Wireless security protocol d. Server configuration

    B

  • 68

    68. What is the primary function of the Wireless Zero Configuration service in Windows? a. Manage wired connections b. Dynamically select wireless networks c. Configure router settings d. Update firmware

    B

  • 69

    69. What does WZC stand for in the context of Windows wireless configuration? a. Wireless Zone Control b. Wireless Zero Configuration c. WLAN Zone Control d. Wired Zone Configuration

    B

  • 70

    70. Which option is recommended for connecting devices that require a stable and fast connection? a. Wireless b. Ethernet c. Bluetooth d. Infrared

    B

  • 71

    71. What is the main focus of the study regarding safety in computer networks? a. Hardware vulnerabilities b. Software vulnerabilities c. Unauthorized access methods d. All of the above

    C

  • 72

    72. Which of the following is a characteristic feature of allocated computer systems? a. Centralized components b. Limited information exchange c. Territorial separation d. Single data storage

    C

  • 73

    73. What is the primary classification of threats based on their nature of occurrence? a. Natural and artificial b. External and internal c. Deliberate and accidental d. None of the above

    A

  • 74

    74.Which is an example of an unintentional, accidental threat to computer networks? a. Virus infection b. Deliberate data theft c. System software malfunction d. Tapping communication lines

    C

  • 75

    75.What does the term "Rootkit" refer to in the context of computer security? a. A type of computer virus b. An encryption method c. A Trojan Horse program d. A program that hides its presence in the system

    D

  • 76

    76.Which of the following is a mechanism of a standard remote attack? a. Passive listening b. Modification and falsification of data c. Both a and b d. Neither a nor b

    C

  • 77

    77.What is the purpose of a Traffic Sniffing attack? a. Gaining control over a system b. Intercepting and analyzing network traffic c. Executing harmful code in the RAM d. Sending incorrectly constructed HTTP inquiries

    B

  • 78

    78.What does a Page Interceptor (Hijacker) do? a. Intercept network traffic b. Change the start page of a computer c. Create clones of licensed software d. Execute harmful code in the RAM

    B

  • 79

    79.Which channel of information leakage is related to electromagnetic fields during information processing? a. Acoustic channel b. Unauthorized access channel c. Electromagnetic channel d. Unapproved copying channel

    C

  • 80

    80.What is the main function of computer viruses? a. Create new files b. Modify and falsify data c. Infection of files and systems d. Intercepting user data

    C

  • 81

    81.What is the primary purpose of Cookies files in the context of the Internet? a. Enhance website performance b. Store user data for identification c. Spread computer viruses d. Intercept network traffic

    B

  • 82

    82. What is the primary function of a Keyboard Interceptor (Keylogger)? a. Intercepting network traffic b. Intercepting data entered through the keyboard c. Executing harmful code in the RAM d. Creating clones of licensed software

    B

  • 83

    83.Which of the following is an example of a natural threat to computer networks? a. Deliberate data theft b. Earthquake c. Virus infection d. Tapping communication lines

    B

  • 84

    84. Which type of computer virus is known for changing its code to avoid detection? a. Stealth virus b. Macrocommand virus c. Load virus d. File virus

    A

  • 85

    85. What is the main goal of a Logic Bomb? a. Intercepting network traffic b. Executing harmful code in the RAM c. Carrying out unapproved operations upon specific events d. Creating clones of licensed software

    C

  • 86

    86. What is the primary function of a Backdoor in computer security? a. Intercepting network traffic b. Infection of files and systems c. Providing unauthorized access bypassing security systems d. Executing harmful code in the RAM

    C

  • 87

    87. Which of the following is a network-level attack mechanism? a. Passive listening b. Navigation violation c. Traffic sniffing d. All of the above

    D

  • 88

    88. What is the primary goal of a Mail Bomb attack? a. Intercepting network traffic b. Intercepting data entered through the keyboard c. Sending a large number of emails to overload a system d. Creating clones of licensed software

    C

  • 89

    89. What type of attack is an ARP Spoofing? a. Traffic sniffing b. Navigation violation c. Disability attack d. Useless expending of a computing resource

    B

  • 90

    90. What is the primary purpose of a Trojan (Trojan Horse)? a. Intercepting network traffic b. Executing harmful code in the RAM c. Performing functions or imitating other programs d. Sending a large number of emails to overload a system

    C

  • 91

    91. Which of the following is a passive attack mechanism? a. Traffic sniffing b. Attempt of gaining access c. Useless expending of a computing resource d. Launching applications on the attacked object

    A

  • 92

    92. What is the primary function of a Web Bug? a. Intercepting network traffic b. Creating clones of licensed software c. Tracing user statistics on websites d. Executing harmful code in the RAM

    C

  • 93

    93. Which channel of information leakage involves files that consist of data about the user gathered by web servers? a. Acoustic channel b. Unauthorized access channel c. Cookies files d. Unapproved copying channel

    C

  • 94

    94. What is the main purpose of Spyware in computer security? a. Intercepting network traffic b. Tracing network abilities c. Tracing system and sending gathered information to a third party d. Executing harmful code in the RAM

    C

  • 95

    95. Which of the following is NOT a computer virus type? a. File virus b. Stealth virus c. Navigation virus d. Macrocommand virus

    C

  • 96

    96. What is the primary purpose of a Zombie program? a. Executing harmful code in the RAM b. Intercepting network traffic c. Installing itself in a system and waiting for commands d. Creating clones of licensed software

    C

  • 97

    97. What is the primary function of a Rootkit in computer security? a. Intercepting network traffic b. Hiding its presence in the system c. Executing harmful code in the RAM d. Creating clones of licensed software

    B

  • 98

    98.What does a Page Interceptor (Hijacker) attack primarily affect? a. Intercepting network traffic b. Changing the start page of a computer c. Tracing user statistics on websites d. Creating clones of licensed software

    B

  • 99

    99. Which of the following is a method of information leakage through the electromagnetic channel? a. Acoustic channel b. Unauthorized access channel c. Electromagnetic channel d. Unapproved copying channel

    C

  • 100

    100.What are the three basic principles of information security that should be provided in computer networks? a. Data integrity, confidentiality, availability b. File integrity, user confidentiality, network availability c. Hardware integrity, software confidentiality, data availability d. All of the above

    A

  • Practical Research 2

    Practical Research 2

    Eric Riman · 50問 · 2年前

    Practical Research 2

    Practical Research 2

    50問 • 2年前
    Eric Riman

    perdev exam

    perdev exam

    Eric Riman · 50問 · 2年前

    perdev exam

    perdev exam

    50問 • 2年前
    Eric Riman

    Entrep Exam

    Entrep Exam

    Eric Riman · 72問 · 2年前

    Entrep Exam

    Entrep Exam

    72問 • 2年前
    Eric Riman

    MIL

    MIL

    Eric Riman · 23問 · 2年前

    MIL

    MIL

    23問 • 2年前
    Eric Riman

    3IS

    3IS

    Eric Riman · 30問 · 2年前

    3IS

    3IS

    30問 • 2年前
    Eric Riman

    CSS

    CSS

    Eric Riman · 10問 · 2年前

    CSS

    CSS

    10問 • 2年前
    Eric Riman

    問題一覧

  • 1

    1. What is the primary purpose of Occupational Health and Safety (OHS) in the computer and technology industries? a. Enhancing productivity b. Preventing illness and injury c. Maximizing profits d. Expanding market share

    B

  • 2

    2. In the context of general safety tips, why should removed covers and parts be placed in a safe place during machine maintenance? a. To keep them clean b. To prevent personnel from tripping over them c. To speed up the maintenance process d. To showcase the machine's internal components

    B

  • 3

    3. Why is it important to reinstall all safety shields, guards, labels, and ground wires after servicing a machine? a. To improve the machine's aesthetics b. To comply with safety regulations c. To make the machine look complete d. To reduce the risk of accidents

    B

  • 4

    4. What precaution should be taken regarding clothing when working with machines? a. Wear loose clothing for comfort b. Wear tight clothing to stay warm c. Avoid wearing loose clothing that can be trapped in moving parts d. Wear any clothing as long as it is clean

    C

  • 5

    5. Before opening server/workstation covers, what should be done with power cords, telecommunications systems, networks, and modems? a. Keep them plugged in b. Disconnect them c. Leave them hanging d. Ask for permission from a supervisor

    B

  • 6

    6. What is the first step in a safety inspection guide for identifying potentially unsafe conditions or electrical products? a. Disconnecting power b. Checking for damage c. Powering off the computer d. Testing procedures

    B

  • 7

    7. In electrical safety, what should be done in case of an electrical accident? a. Continue working to fix the issue b. Switch off power and seek medical aid c. Ignore the accident and continue working d. Ask others to handle the situation

    B

  • 8

    8. What is the purpose of a test procedure in the context of computer systems and networks? a. To make the testing process longer b. To confuse technicians c. To guide and ensure thorough testing d. To limit the scope of testing

    C

  • 9

    9. What is the final step in testing a configured computer system and network? a. Running the tests again b. Checking the specification c. Recording test results in a log d. Validating test information

    B

  • 10

    10. What does the ipconfig /all command display in a command prompt? a. Computer name b. IP configuration information c. Installed programs d. Network switch status

    B

  • 11

    11. What should be checked if the Link light is not lit on a computer's RJ-45 port? a. Power supply b. Network switch or router c. Graphics card d. RAM

    B

  • 12

    12. Which command is used to check network configuration in a command prompt? a. config /check b. network /status c. ipconfig /all d. netcheck /config

    C

  • 13

    13. What is the purpose of checking the network configuration in the Start menu? a. To log out of the network b. To verify physical connections c. To troubleshoot network issues d. To change network passwords

    B

  • 14

    14. What is the primary purpose of the ping command in network testing? a. Checking network security b. Testing computer performance c. Verifying network connectivity d. Measuring internet speed

    C

  • 15

    15. What does a successful ping test indicate? a. Network congestion b. Internet speed issues c. Network connectivity d. Server overload

    C

  • 16

    16. What is the purpose of gathering test information in a test procedure? a. To confuse testers b. To run tests required by the procedure c. To speed up the testing process d. To create log files

    B

  • 17

    17. What should be done if a test shows problems according to the test procedure? a. Ignore the problems b. Document the problems and take further action c. Continue testing without addressing the problems d. Switch off the computer immediately

    B

  • 18

    18. What is the role of validating test information in the testing process? a. To create log files b. To confuse testers c. To ensure correct data d. To skip certain tests

    C

  • 19

    19. What does the term "ICT professional" refer to? a. Information and Communication Technology professional b. International Computer Technician c. Intelligent Computer Troubleshooter d. Information Coding and Testing

    A

  • 20

    20. What is the primary goal of testing a computer network? a. Increasing network complexity b. Verifying that the network works as expected c. Reducing the number of connected devices d. Ignoring network issues

    B

  • 21

    21. What is the purpose of Wireless Zero Configuration (WZC) in Windows? a. Manage wired network connections b. Dynamically select wireless networks based on user preferences c. Configure modem settings d. Control router security settings

    B

  • 22

    22. Which wireless standard is considered the most stable and offers the fastest speeds? a. 802.11g b. 802.11n c. 802.11ac d. 802.11b

    B

  • 23

    23. What should you connect to the WAN/Internet Port on a router? a. Computer b. Printer c. Modem d. Switch

    C

  • 24

    24. What is the purpose of MAC address registration with the internet service provider during router setup? a. Enhance router security b. Connect to the LAN c. Authorize router to use the internet service d. Update firmware

    C

  • 25

    25. How can you find the IP address of a router during setup? a. Perform a web search b. Check the router's label or documentation c. Use the default address 192.168.1.1 d. All of the above

    B

  • 26

    26. What is the most common username for accessing router settings? a. admin b. user c. router d. guest

    A

  • 27

    27. What security method is recommended for protecting a wireless network? a. WEP b. WPA c. WPA2-PSK d. None

    C

  • 28

    28. What does SSID stand for in the context of wireless networks? a. System Security Identifier b. Service Set Identifier c. Secure Socket ID d. Signal Strength Indicator

    B

  • 29

    29. After setting up a wireless network, what should you do to enable SSID broadcast? a. Check the box in the router settings b. Restart the router c. Connect a computer via Ethernet d. Update firmware

    A

  • 30

    30. Which type of network connects computers within a limited geographical area, like a building or school? a. WAN b. PAN c. LAN d. MAN

    C

  • 31

    31. What is the primary function of servers in a network? a. Interact with human users b. Provide services to other computers on the network c. Connect to the internet d. Store data locally

    B

  • 32

    32. What device provides a bridge between wireless users and a wired network? a. Modem b. Router c. Switch d. Wireless Access Point (WAP)

    D

  • 33

    33. In a WAN, what is used to connect local and metropolitan networks to global communications networks? a. Routers b. Hubs c. Transoceanic cabling d. Modems

    C

  • 34

    34. What does WAN stand for in networking? a. Wireless Area Network b. Wide Area Network c. Wired Area Network d. Web Area Network

    B

  • 35

    35. What is the purpose of SSID in a wireless network? a. Secure System Identifier b. Signal Strength Indicator c. Service Set Identifier d. System Status Identifier

    C

  • 36

    36. How should you secure a wireless network for maximum protection from hackers? a. WEP b. WPA c. WPA2-PSK d. Open (No security)

    C

  • 37

    37. What is the primary difference between a LAN and a WAN? a. Geographic size b. Number of connected devices c. Speed of connection d. Security protocols

    A

  • 38

    38. What is the purpose of IP addresses in networking? a. Identify network devices b. Provide internet access c. Secure data transmission d. Control network traffic

    A

  • 39

    39. What is the function of a switch hub in network connectivity? a. Connects local and metropolitan networks b. Provides internet access c. Bridges wireless and wired networks d. Connects devices within a LAN

    D

  • 40

    40. What is the first step in setting up a wireless router? a. Connect devices with Ethernet cables b. Power on the router c. Configure router settings d. Purchase a wireless router

    B

  • 41

    41. Which wireless standard is backward compatible with older standards like 802.11g? a. 802.11n b. 802.11ac c. 802.11b d. 802.11ax

    A

  • 42

    42. What is the purpose of connecting a computer via Ethernet during router setup? a. Enhance internet speed b. Provide stability and faster connection c. Configure wireless settings d. Update router firmware

    C

  • 43

    43. Where can you find the MAC address of a router? a. In the router settings b. On the router's label c. In the user manual d. All of the above

    B

  • 44

    44. Which IP address range is reserved for exclusive use in a LAN? a. 192.168.0.0 - 192.168.255.255 b. 172.16.0.0 - 172.31.255.255 c. 10.0.0.0 - 10.255.255.255 d. All of the above

    D

  • 45

    45. What does CAT 5 refer to in network connectivity? a. Router model b. Ethernet cable type c. Wireless security protocol

    B

  • 46

    46. What is the primary function of the Wireless Zero Configuration service in Windows? a. Manage wired connections b. Dynamically select wireless networks c. Configure router settings d. Update firmware

    B

  • 47

    47. What does WZC stand for in the context of Windows wireless configuration? a. Wireless Zone Control b. Wireless Zero Configuration c. WLAN Zone Control d. Wired Zone Configuration

    B

  • 48

    48. Which option is recommended for connecting devices that require a stable and fast connection? a. Wireless b. Ethernet c. Bluetooth d. Infrared

    B

  • 49

    49. What is the primary function of SSID broadcast in wireless networks? a. Enhance security b. Connect devices automatically c. Increase signal strength d. Extend network range

    B

  • 50

    50. What is the role of a wireless access point (WAP) in a network? a. Connects routers to the internet b. Bridges wireless and wired networks c. Provides internet access to devices d. Configures router settings

    B

  • 51

    51. Which security method is considered the most difficult to crack? a. WEP b. WPA c. WPA2-PSK d. No security (Open)

    C

  • 52

    52. What is the purpose of the WAN in networking? a. Connects local devices b. Bridges LAN and WAN c. Connects global networks d. Provides internet access

    C

  • 53

    53. What is the primary function of servers in a network? a. Connect to the internet b. Interact with human users c. Provide services to other computers d. Store local data

    C

  • 54

    54. What is the significance of a unique SSID in a wireless network? a. Enhances signal strength b. Improves security c. Identifies the network to other devices d. Connects to the internet

    C

  • 55

    55. What is the primary purpose of the MAC address in network connectivity? a. Enhance security b. Identify network devices c. Connect to the internet d. Configure router settings

    B

  • 56

    56. What does LAN stand for in networking? a. Local Area Network b. Large Area Network c. Long Area Network d. Limited Area Network

    A

  • 57

    57. What is the function of a switch in network connectivity? a. Connects LAN and WAN b. Bridges wireless and wired networks c. Connects devices within a LAN d. Provides internet access

    C

  • 58

    58. Which security method is considered outdated and less secure? a. WPA2-PSK b. WPA c. WEP d. Open (No security)

    C

  • 59

    59. What is the purpose of SSID broadcast in a wireless network? a. Enhance security b. Connect devices automatically c. Increase signal strength d. Extend network range

    B

  • 60

    60. What does WAN stand for in networking? a. Wireless Area Network b. Wide Area Network c. Wired Area Network d. Web Area Network

    B

  • 61

    61. What is the purpose of IP addresses in networking? a. Identify network devices b. Provide internet access c. Secure data transmission d. Control network traffic

    A

  • 62

    62. What is the first step in setting up a wireless router? a. Connect devices with Ethernet cables b. Power on the router c. Configure router settings d. Purchase a wireless router

    B

  • 63

    63. Which wireless standard is backward compatible with older standards like 802.11g? a. 802.11n b. 802.11ac c. 802.11b d. 802.11ax

    A

  • 64

    64. What is the purpose of connecting a computer via Ethernet during router setup? a. Enhance internet speed b. Provide stability and faster connection c. Configure wireless settings d. Update router firmware

    C

  • 65

    65. Where can you find the MAC address of a router? a. In the router settings b. On the router's label c. In the user manual d. All of the above

    B

  • 66

    66. Which IP address range is reserved for exclusive use in a LAN? a. 192.168.0.0 - 192.168.255.255 b. 172.16.0.0 - 172.31.255.255 c. 10.0.0.0 - 10.255.255.255 d. All of the above

    D

  • 67

    67. What does CAT 5 refer to in network connectivity? a. Router model b. Ethernet cable type c. Wireless security protocol d. Server configuration

    B

  • 68

    68. What is the primary function of the Wireless Zero Configuration service in Windows? a. Manage wired connections b. Dynamically select wireless networks c. Configure router settings d. Update firmware

    B

  • 69

    69. What does WZC stand for in the context of Windows wireless configuration? a. Wireless Zone Control b. Wireless Zero Configuration c. WLAN Zone Control d. Wired Zone Configuration

    B

  • 70

    70. Which option is recommended for connecting devices that require a stable and fast connection? a. Wireless b. Ethernet c. Bluetooth d. Infrared

    B

  • 71

    71. What is the main focus of the study regarding safety in computer networks? a. Hardware vulnerabilities b. Software vulnerabilities c. Unauthorized access methods d. All of the above

    C

  • 72

    72. Which of the following is a characteristic feature of allocated computer systems? a. Centralized components b. Limited information exchange c. Territorial separation d. Single data storage

    C

  • 73

    73. What is the primary classification of threats based on their nature of occurrence? a. Natural and artificial b. External and internal c. Deliberate and accidental d. None of the above

    A

  • 74

    74.Which is an example of an unintentional, accidental threat to computer networks? a. Virus infection b. Deliberate data theft c. System software malfunction d. Tapping communication lines

    C

  • 75

    75.What does the term "Rootkit" refer to in the context of computer security? a. A type of computer virus b. An encryption method c. A Trojan Horse program d. A program that hides its presence in the system

    D

  • 76

    76.Which of the following is a mechanism of a standard remote attack? a. Passive listening b. Modification and falsification of data c. Both a and b d. Neither a nor b

    C

  • 77

    77.What is the purpose of a Traffic Sniffing attack? a. Gaining control over a system b. Intercepting and analyzing network traffic c. Executing harmful code in the RAM d. Sending incorrectly constructed HTTP inquiries

    B

  • 78

    78.What does a Page Interceptor (Hijacker) do? a. Intercept network traffic b. Change the start page of a computer c. Create clones of licensed software d. Execute harmful code in the RAM

    B

  • 79

    79.Which channel of information leakage is related to electromagnetic fields during information processing? a. Acoustic channel b. Unauthorized access channel c. Electromagnetic channel d. Unapproved copying channel

    C

  • 80

    80.What is the main function of computer viruses? a. Create new files b. Modify and falsify data c. Infection of files and systems d. Intercepting user data

    C

  • 81

    81.What is the primary purpose of Cookies files in the context of the Internet? a. Enhance website performance b. Store user data for identification c. Spread computer viruses d. Intercept network traffic

    B

  • 82

    82. What is the primary function of a Keyboard Interceptor (Keylogger)? a. Intercepting network traffic b. Intercepting data entered through the keyboard c. Executing harmful code in the RAM d. Creating clones of licensed software

    B

  • 83

    83.Which of the following is an example of a natural threat to computer networks? a. Deliberate data theft b. Earthquake c. Virus infection d. Tapping communication lines

    B

  • 84

    84. Which type of computer virus is known for changing its code to avoid detection? a. Stealth virus b. Macrocommand virus c. Load virus d. File virus

    A

  • 85

    85. What is the main goal of a Logic Bomb? a. Intercepting network traffic b. Executing harmful code in the RAM c. Carrying out unapproved operations upon specific events d. Creating clones of licensed software

    C

  • 86

    86. What is the primary function of a Backdoor in computer security? a. Intercepting network traffic b. Infection of files and systems c. Providing unauthorized access bypassing security systems d. Executing harmful code in the RAM

    C

  • 87

    87. Which of the following is a network-level attack mechanism? a. Passive listening b. Navigation violation c. Traffic sniffing d. All of the above

    D

  • 88

    88. What is the primary goal of a Mail Bomb attack? a. Intercepting network traffic b. Intercepting data entered through the keyboard c. Sending a large number of emails to overload a system d. Creating clones of licensed software

    C

  • 89

    89. What type of attack is an ARP Spoofing? a. Traffic sniffing b. Navigation violation c. Disability attack d. Useless expending of a computing resource

    B

  • 90

    90. What is the primary purpose of a Trojan (Trojan Horse)? a. Intercepting network traffic b. Executing harmful code in the RAM c. Performing functions or imitating other programs d. Sending a large number of emails to overload a system

    C

  • 91

    91. Which of the following is a passive attack mechanism? a. Traffic sniffing b. Attempt of gaining access c. Useless expending of a computing resource d. Launching applications on the attacked object

    A

  • 92

    92. What is the primary function of a Web Bug? a. Intercepting network traffic b. Creating clones of licensed software c. Tracing user statistics on websites d. Executing harmful code in the RAM

    C

  • 93

    93. Which channel of information leakage involves files that consist of data about the user gathered by web servers? a. Acoustic channel b. Unauthorized access channel c. Cookies files d. Unapproved copying channel

    C

  • 94

    94. What is the main purpose of Spyware in computer security? a. Intercepting network traffic b. Tracing network abilities c. Tracing system and sending gathered information to a third party d. Executing harmful code in the RAM

    C

  • 95

    95. Which of the following is NOT a computer virus type? a. File virus b. Stealth virus c. Navigation virus d. Macrocommand virus

    C

  • 96

    96. What is the primary purpose of a Zombie program? a. Executing harmful code in the RAM b. Intercepting network traffic c. Installing itself in a system and waiting for commands d. Creating clones of licensed software

    C

  • 97

    97. What is the primary function of a Rootkit in computer security? a. Intercepting network traffic b. Hiding its presence in the system c. Executing harmful code in the RAM d. Creating clones of licensed software

    B

  • 98

    98.What does a Page Interceptor (Hijacker) attack primarily affect? a. Intercepting network traffic b. Changing the start page of a computer c. Tracing user statistics on websites d. Creating clones of licensed software

    B

  • 99

    99. Which of the following is a method of information leakage through the electromagnetic channel? a. Acoustic channel b. Unauthorized access channel c. Electromagnetic channel d. Unapproved copying channel

    C

  • 100

    100.What are the three basic principles of information security that should be provided in computer networks? a. Data integrity, confidentiality, availability b. File integrity, user confidentiality, network availability c. Hardware integrity, software confidentiality, data availability d. All of the above

    A