Networking interview preparation Quiz 1 Welcome to your Fresher Interview Preparation - Networking Skills - 1 Name Email Phone Number 1. is a challenge-response authentication protocol that uses the industry-standardmessage digest 5 (MD5) hashing scheme to encrypt the response.CHAP ( challenge handshake authentication protocol)D-CHAPMS-CHAPnone2. Ipsec supports ____________ encryption modes:None2433. __________ referred to as mirroring with 2 hard drive.Raid 0noneRaidRaid 14. _____________ is the use of mathematical transformations to protect data.cryptographyaddressmemorynone5. media is categorized in ________ types42none36. _______________ uses plaintext passwordsTAPDAPnonePAP ( password authentication protocol )7. ____________ is part of a large process of encoding and decoding messages to keepinformation secure.dataencryptionnonedecryption8. ______________ mode encrypts both the header and the data portion.Tunnelnonedatamemory9. A ____________ is used as a failover mechanism to provide reliability in systemconfigurations.nonecold sparehot sparespare10. _______________ provides remote networking for telecommuters, mobile workers and systemadministrators who monitor and manage servers at multiple branch offices.RAS ( remote access service)noneCASDAS11. What are the _______ basic hardware required to setup a computer network?143212. There are ______ types of essential components in computer networking.32none413. ______________ is a protocol that supplies secure data communications through dataencryption and decryption.data layernetworkssecure sockets layernone14. _______________ is a nonreversible, encrypted password authentication protocol.MS-CHAP (Microsoft challenge handshake authentication protocol).CHAPD-CHAPnone15. L2TP is an extension to the ______ protocol that enables ISPs to operate virtual privatenetworks.DDDpppTTTnone16. Network layer firewalls generally fall into ___________ sub-categories.none23117. ____________ is based on an open standard defined in RFCs 1332, 1661 and 2153.PPP (point-to-point protocol )noneTTTDDD18. ________________ is a scheme that is part of the IEEE 802.11 wireless networking standardto secure IEEE 802.11 wireless networks.WPA2WPAWEP (wired equivalent privacy)none19. _____________ provides a stronger encryption mechanism through advanced encryptionstandard (AES), which is a requirement for some government users.noneWEPWPA2WPA20. Ipsec protocols operate at the ____________ layer.networkdatamemorynone21. consists of computer programs that attempts to identify, thwart and eliminatecomputer viruses and other malicious software.filesnonedirectoryantivirus software22. Networking allows us to share ___________ main thingsnone23423. is an older industry standard that is part of windows remote access client toensure interoperability with other remote access software.CLIPnoneSLIPDLIP24. 3. __________ network cables are used to connect computers.RJRJ-45RJ-98none25. An ______________ is a private network that uses internet protocols , network connectivity tosecurely share part of an organization information.nonememoryextranetdata26. ________ encrypts only data portion of each packet, but leaves the header untouched.Transport modedata modememory modenone27. Fault tolerance is another term for ______________.redundancynonememoryfunctions28. A ________________ is an example of a fault-tolerant storage device that uses dataredundancy.RAIDnonememorydata29. _______________ attack is intended to cause full or partial network outages so that people willnot be able to use network resources.datanoneserviceDenial of service30. Protocols control the entire data transmission through the ____________.addressmemorynonenetwork31. _____________ is the ability of a system to continue functioning when parts of the systemfails.memorydatanoneFault tolerance32. firewalls have packet-filtering capabilities but cannot make more complexdecisions on what stage communications between hosts have reached.alphadatanonestateless33. ___________________ is a tunneling protocol used to support virtual private networks (VPN).noneL2 TP ( layer 2 tunneling protocol).CLDDLP34. _____________ is a set of protocols used to support secure exchange of packets at the IP layer.DcsecTpsecnoneIPSec35. ______________ are gaining in popularity as a way to ensure secure authentication using aphysical key.data cardsnonesmard cardssmall card36. L2TP combines the best features of _______ tunneling protocols.3none4237. A __________ is a piece of software code that is buried inside a trusted application that invokessome action to wreak havoc on the computer or other network resources.viruscodememorynone38. ___________________ is the process of changing the IP address so that data packets will beaccepted.IPaddressnoneIP address spoofing39. ____________ is designed to enable two parties to excahnge private information across anopen network.noneTAPEAPkerberos40. Networking allows us to exchange _______ between computers.deltamemorydatanone41. In wireless media _________ are used to transmit the data.spectrumsradio spectrumsnonedata42. _________ is an AAA protocol for applications such as network access or IP mobility.PAPTAPnoneRADIUS (remote authentication dial-in user service)43. ____________ secures wireless data transmission by changing the key dynamically.noneWPAWPA2WEP44. ppp has ________ main componentsnone34245. A _________ array is a collection of drives which collectively act as a single storage systemwhich can tolerate the failure of a drive without losing data and which can operate independently ofeach other.datanoneRAIDmemory46. ______________ firewalls hold some information on the state of connections as part of theirrules.datafullnonestatefullmemory47. A _____________ is a system in which multiple computers are connected to each other to shareinformation and resources.computer networkdataoperatingnone48. _____________ is a universal authentication framework frequently used in wireless networksand point-to-point connections.EAPnoneDAPTAP49. A _____________ is a logical grouping of network devices in the same broadcast domain thatcan span multiple physical segments.Virtual LANnonedatamemory50. ____________ referred to as striping is not redundant.Raid 0noneRaid 1RaidPlease fill in the comment box below. Time is Up!