Networking interview preparation Quiz 1 Welcome to your Fresher Interview Preparation - Networking Skills - 1 Name Email Phone Number 1. media is categorized in ________ types24none32. ________ encrypts only data portion of each packet, but leaves the header untouched.memory modenoneTransport modedata mode3. ___________________ is the process of changing the IP address so that data packets will beaccepted.addressIPnoneIP address spoofing4. ____________ is based on an open standard defined in RFCs 1332, 1661 and 2153.DDDPPP (point-to-point protocol )TTTnone5. Network layer firewalls generally fall into ___________ sub-categories.132none6. _______________ attack is intended to cause full or partial network outages so that people willnot be able to use network resources.datanoneserviceDenial of service7. is a challenge-response authentication protocol that uses the industry-standardmessage digest 5 (MD5) hashing scheme to encrypt the response.noneCHAP ( challenge handshake authentication protocol)D-CHAPMS-CHAP8. _____________ provides a stronger encryption mechanism through advanced encryptionstandard (AES), which is a requirement for some government users.WPA2WEPWPAnone9. ____________ secures wireless data transmission by changing the key dynamically.WPAnoneWEPWPA210. _________ is an AAA protocol for applications such as network access or IP mobility.PAPTAPRADIUS (remote authentication dial-in user service)none11. _______________ is a nonreversible, encrypted password authentication protocol.noneMS-CHAP (Microsoft challenge handshake authentication protocol).CHAPD-CHAP12. ____________ is designed to enable two parties to excahnge private information across anopen network.noneTAPkerberosEAP13. A __________ is a piece of software code that is buried inside a trusted application that invokessome action to wreak havoc on the computer or other network resources.memorycodevirusnone14. __________ referred to as mirroring with 2 hard drive.Raid 0Raid 1noneRaid15. Networking allows us to exchange _______ between computers.nonedeltamemorydata16. _____________ is the ability of a system to continue functioning when parts of the systemfails.datanonememoryFault tolerance17. firewalls have packet-filtering capabilities but cannot make more complexdecisions on what stage communications between hosts have reached.statelessnonedataalpha18. ______________ are gaining in popularity as a way to ensure secure authentication using aphysical key.small cardsmard cardsdata cardsnone19. _____________ is a universal authentication framework frequently used in wireless networksand point-to-point connections.DAPEAPTAPnone20. ppp has ________ main components234none21. Networking allows us to share ___________ main things324none22. A _________ array is a collection of drives which collectively act as a single storage systemwhich can tolerate the failure of a drive without losing data and which can operate independently ofeach other.noneRAIDdatamemory23. What are the _______ basic hardware required to setup a computer network?231424. A ________________ is an example of a fault-tolerant storage device that uses dataredundancy.RAIDnonedatamemory25. _______________ uses plaintext passwordsnoneTAPDAPPAP ( password authentication protocol )26. ________________ is a scheme that is part of the IEEE 802.11 wireless networking standardto secure IEEE 802.11 wireless networks.WPAWEP (wired equivalent privacy)WPA2none27. L2TP combines the best features of _______ tunneling protocols.324none28. ___________________ is a tunneling protocol used to support virtual private networks (VPN).noneL2 TP ( layer 2 tunneling protocol).CLDDLP29. An ______________ is a private network that uses internet protocols , network connectivity tosecurely share part of an organization information.nonememorydataextranet30. consists of computer programs that attempts to identify, thwart and eliminatecomputer viruses and other malicious software.noneantivirus softwaredirectoryfiles31. _______________ provides remote networking for telecommuters, mobile workers and systemadministrators who monitor and manage servers at multiple branch offices.noneRAS ( remote access service)DASCAS32. L2TP is an extension to the ______ protocol that enables ISPs to operate virtual privatenetworks.pppDDDnoneTTT33. _____________ is a set of protocols used to support secure exchange of packets at the IP layer.TpsecDcsecnoneIPSec34. Ipsec protocols operate at the ____________ layer.memorynetworkdatanone35. ____________ referred to as striping is not redundant.Raid 1noneRaidRaid 036. A _____________ is a system in which multiple computers are connected to each other to shareinformation and resources.computer networknonedataoperating37. There are ______ types of essential components in computer networking.2none4338. A ____________ is used as a failover mechanism to provide reliability in systemconfigurations.sparecold sparehot sparenone39. ____________ is part of a large process of encoding and decoding messages to keepinformation secure.nonedecryptiondataencryption40. ______________ mode encrypts both the header and the data portion.dataTunnelmemorynone41. is an older industry standard that is part of windows remote access client toensure interoperability with other remote access software.CLIPSLIPDLIPnone42. Protocols control the entire data transmission through the ____________.nonenetworkmemoryaddress43. _____________ is the use of mathematical transformations to protect data.addresscryptographynonememory44. A _____________ is a logical grouping of network devices in the same broadcast domain thatcan span multiple physical segments.nonememoryVirtual LANdata45. Ipsec supports ____________ encryption modes:324None46. ______________ is a protocol that supplies secure data communications through dataencryption and decryption.secure sockets layerdata layernonenetworks47. Fault tolerance is another term for ______________.redundancynonememoryfunctions48. ______________ firewalls hold some information on the state of connections as part of theirrules.datafullnonememorystatefull49. 3. __________ network cables are used to connect computers.noneRJ-98RJ-45RJ50. In wireless media _________ are used to transmit the data.dataradio spectrumsnonespectrumsPlease fill in the comment box below. Time is Up!