Beruflich Dokumente
Kultur Dokumente
Hardware”.
1. Which is the smallest unit amongst the following with reference to the ATM-
a) transmission path
b) virtual path
c) virtual circuit
d) all are of the same size
View Answer
Answer: c
Explanation: Virtual circuits are the smallest unit in the above options.
a) True
b) False
View Answer
Answer: b
Explanation: The above figure represents the exposed terminal problem.
6. A device which is used to boost the signal between two cable segments or wireless access points
is
a) Booster
b) Repeater
c) Switch
d) Router
View Answer
Answer: c
Explanation: The correct term for such a device is a Repeater.
This set of Network Security Questions and Answers for freshers focuses on “Layers – I”.
1. If a periodic signal is decomposed into five sine waves with frequencies of 100, 300, 500, 700, and
900 Hz, what is its bandwidth?
a) 2500 Hz
b) 900 Hz
c) 800 Hz
d) can’t be determined with the information given
View Answer
Answer: c
Explanation: The bandwidth is 900-100 = 800 Hz.
2. Assume we need to download text documents at the rate of 100 pages per second. What is the
required bit rate of the channel?
a) 1.846 Mbps
b) 1.536 Mbps
c) 2.4 Mbps
d) None of the Mentioned
View Answer
Answer: b
Explanation: Average No, of lines u=in each page = 24
Each line has 80 char.
Each char required 8 bits
100 x 24 x 80 x 8 = 1,536,000=1536 Mbps.
3. A digitized voice channel is made by digitizing a 4-kHz bandwidth analog voice signal. We need to
sample the signal at twice the highest frequency (two samples per hertz). We assume that each
sample requires 8 bits. What is the required bit rate?
a) 64 kbps
b) 32 kbps
c) 128 kbps
d) 16 kbps
View Answer
Answer: a
Explanation: 2 × 4000 × 8 = 64,000 = 64kbps.
4. What is the bit rate for high-definition TV (HDTV)?
a) 1.4 Gbps
b) 2 Gbps
c) 1.5 Gbps
d) 1.8 Gbps
View Answer
Answer: c
Explanation:
The HDTV screen is normally a ratio of 16: 9 (in contrast to 4: 3 for regular TV)
There are 1920 by 1080 pixels per screen, and
Screen is renewed 30 times per second.
24-bits represent one color pixel.
Therefore Bit Rate = 1920 × 1080 × 30 × 24 = 1,492992,000 = 1.5 Gbps.
5. A device is sending out data at the rate of 1000 bps. How long does it take to send a file of 100,000
characters?
a) 200s
b) 400s
c) 600s
d) 800s
View Answer
Answer: d
Explanation: ((100,000 × 8) / 1000) s = 800 s.
6. A file contains 2 million bytes. How long does it take to download this file using a 56-Kbps
channel?
a) 1-2 mins
b) 5-6 mins
c) 2-4 mins
d) 7-8 mins
View Answer
Answer: b
Explanation:
With a 56-Kbps channel, it takes 16,000,000/56,000 = 289 s ≈ 5 minutes.
7. We need to send 265 kbps over a noiseless channel with a bandwidth of 20 kHz. How many signal
levels do we need?
a) 1024
b) 512
c) 256
d) 128
View Answer
Answer: d
Explanation:
256000 = 2 × 20000 × log L = 6.625.
L = 98.7 Levels.
Since this result is not a power of 2, we need to either increase the number of levels or reduce the
bit rate. If we have 128 levels, the bit rate is 280 kbps.
8. Calculate the theoretical highest bit rate of a regular telephone line. The signal-to-noise ratio is
usually 3162.
a) 34.860 kbps
b) 17.40 kbps
c) 11.62 kbps
d) none of the Mentioned
View Answer
Answer: a
Explanation: C = B log (1+SNR) = 3000 log (1+3162) = 34,860 bps.
Logarithm here is in terms of base 2.
9. Calculate the theoretical channel capacity. If SNR(dB) = 36 and the channel bandwidth is 2 MHz.
a) 12 Mbps
b) 24 Mbps
c) 16 Mbps
d) 32 Mbps
View Answer
Answer: b
Explanation: None.
10. A channel has a 1-MHz bandwidth. The SNR for this channel is 63. What is the appropriate bit
rate?
a) 4 Mbps
b) 6 Mbps
c) 8 Mbps
d) 12 Mbps
View Answer
Answer: b
Explanation:
C = Blog_2(1 + SNR) = 10^6 log_2(1 + 63) = 6Mbps.
11. A channel has a 1-MHz bandwidth. The SNR for this channel is 63. What is the appropriate signel
level?
a) 2
b) 8
c) 4
d) 16
View Answer
Answer: c
Explanation: As a continuation to the previous question where we get the channel capacity as 6
Mbps. For better performance we choose 4 Mbps. Thus we calculate L from –
4Mbps = 2 x 1 MHz x logL.
12.
What are the bits transmitted for the Unipolar system?
a) 01101
b) 11010
c) 10110
d) 01001
View Answer
Answer: c
Explanation: High – 1, Low – 0.
This set of Cyber Security Multiple Choice Questions & Answers (MCQs) focuses on “Firewalls – 1”.
5. Firewall examines each ____________ that are entering or leaving the internal network.
a) emails users
b) updates
c) connections
d) data packets
View Answer
Answer: d
Explanation: Firewalls examines each data packets that are entering or leaving the internal network
which ultimately prevents unauthorized access.
9. In the ______________ layer of OSI model, packet filtering firewalls are implemented.
a) Application layer
b) Session layer
c) Presentation layer
d) Network layer
View Answer
Answer: d
Explanation: In the network layer, which is the third layer of the OSI (Open Systems Interconnection)
model, packet filtering firewalls are implemented.
13. Network administrators can create their own ACL rules based on _______ ________ and _______
a) Address, Protocols and Packet attributes
b) Address, Protocols and security policies
c) Address, policies and Packet attributes
d) Network topology, Protocols and data packets
View Answer
Answer: a
Explanation: Network administrators can create their own ACL rules based on Address, Protocols
and Packet attributes. This is generally done where the specific customised type of data packets
need to pass through firewall screening.
This set of Cyber Security Interview Questions and Answers for Experienced people focuses on
“Firewalls – 2”.
6. Application level gateway firewalls protect the network for specific _____________
a) application layer protocol
b) session layer protocol
c) botnet attacks
d) network layer protocol
View Answer
Answer: a
Explanation: Some specific application layer protocols need protection from attacks which is done by
the application level gateway firewall in the application layer of the OSI model.
7. Application level gateway firewalls are also used for configuring cache-servers.
a) True
b) False
View Answer
Answer: a
Explanation: As caching servers, the application level gateway firewalls are configured that helps in
increasing the network performance making it smooth for logging traffic.
2. __________ provides an isolated tunnel across a public network for sending and receiving data
privately as if the computing devices were directly connected to the private network.
a) Visual Private Network
b) Virtual Protocol Network
c) Virtual Protocol Networking
d) Virtual Private Network
View Answer
Answer: d
Explanation: A Virtual Private Network i.e. VPN is a technique used in networking or other
intermediate networks for connecting computers and making them isolated remote computer
networks, maintaining a tunnel of security and privacy.
5. VPNs uses encryption techniques to maintain security and privacy which communicating remotely
via public network.
a) True
b) False
View Answer
Answer: a
Explanation: All VPNs are formed with a combination of tunnelling protocols as well as encryption
techniques for maintaining privacy and security.
8. _________ type of VPNs are used for home private and secure connectivity.
a) Remote access VPNs
b) Site-to-site VPNs
c) Peer-to-Peer VPNs
d) Router-to-router VPNs
View Answer
Answer: a
Explanation: Remote access VPN allows individual users to connect to private networks at home and
access resources remotely.
9. Which types of VPNs are used for corporate connectivity across companies residing in different
geographical location?
a) Remote access VPNs
b) Site-to-site VPNs
c) Peer-to-Peer VPNs
d) Country-to-country VPNs
View Answer
Answer: b
Explanation: Site-to-site VPNs are also known as Router-to-router VPNs which are typically used in
companies and firms for connecting remotely different branches with different geographical
locations.
12. For secure connection, Remote access VPNs rely on ___________ and ____________
a) IPSec, SSL
b) L2TP, SSL
c) IPSec, SSH
d) SSH, SSL
View Answer
Answer: a
Explanation: A remote-access VPN typically depends on either Secure Sockets Layer (SSL) or IP
Security (IPsec) for a secure connection over public network.
15. _________ are also used for hides user’s physical location.
a) Firewall
b) Antivirus
c) Incognito mode
d) VPN
View Answer
Answer: d
Explanation: VPNs are used for hiding your physical location which helps in maintaining anonymity.
Using IP address and browsing habits, link search, your physical location can be traced.
This set of SQL Server Multiple Choice Questions & Answers (MCQs) focuses on “Backup”.
1. Backing up your SQL Server database is essential for _______ your data.
a) protecting
b) preventing
c) replication
d) none of the mentioned
View Answer
Answer: a
Explanation: SQL Server offers many options for creating backups.
8. _________ backups represent the whole database at the time the backup finished.
a) copy-only backup
b) database backup
c) data backup
d) all of the mentioned
View Answer
Answer: b
Explanation: Differential database backups contain only changes made to the database since its
most recent full database backup.
This set of SQL Server Multiple Choice Questions & Answers (MCQs) focuses on “SQL Server
Questions and Answers – Database Maintenance”.
1. The SQL Server Maintenance Solution comprises scripts for running __________ maintenance on all
editions of Microsoft SQL Server.
a) backups
b) integrity checks
c) index
d) all of the mentioned
View Answer
Answer: d
Explanation: The solution is based on stored procedures, the sqlcmd utility, and SQL Server Agent
jobs.
3. Which of the following is used to determine the fragmentation for tables and indexes?
a) DBCC SHOWCONTIG
b) DBCC CHECKDB
c) DBCC CHECKCATALOG
d) None of the mentioned
View Answer
Answer: a
Explanation: In SQL Server 2005 DBCC SHOWCONTIG remains a viable short term option to
determine the database fragmentation.
6. Which of the following command defragments clustered and secondary indexes of the specified
table?
a) DBCC SHOWCONTIG
b) DBCC CHECKDB
c) DBCC CATALOG
d) DBCC INDEXDEFRAG
View Answer
Answer: d
Explanation: DBCC INDEXDEFRAG is an online operation, so it does not hold long-term locks that can
block running queries or updates.
7. ______________ runs UPDATE STATISTICS against all user-defined tables in the current database.
a) sp_updatestats
b) DBCC CHECKDB
c) DBCC CATALOG
d) DBCC INDEXDEFRAG
View Answer
Answer: a
Explanation: sp_updatestats updates all statistics for all tables in the database.
10. Create a Database Maintenance Plan that creates a ________ backup within SQL Server.
a) Partial
b) Snapshot
c) Full
d) None of the mentioned
View Answer
Answer: c
Explanation: Creating a full backup is a minimum recommendation for good database maintenance.
This set of SQL Server Multiple Choice Questions & Answers (MCQs) focuses on “SQL Server Agent”.
1. __________ is a Microsoft Windows service that executes scheduled administrative tasks, which are
called jobs in SQL Server 2014.
a) Log shipping
b) Task
c) Agent
d) None of the mentioned
View Answer
Answer: c
Explanation: The SQL Server Agent is a service that lets you configure scheduled tasks and system
alerts.
10. Which of the following members has access to SQL Server Agent?
a) members of the systemadmin
b) members of the sysadmin
c) members of the sysadministraion
d) none of the mentioned
View Answer
Answer: b
Explanation: Members of the SQLAgentUserRole, SQLAgentReaderRole, and SQLAgentOperatorRole
fixed database roles in msdb, and members of the sysadmin fixed server role have access to SQL
Server Agent.
A. Deferred update
B. Immediate update
C. Two-phase commit
D. Recovery management
B. Security measures
C. Concurrency measures
D. Authorization measures
A. system recovery
B. media recovery
C. database recovery
D. failure recovery
A. Filter
B. Recovery
C. Security
D. Scalability
B. hard errors
C. system errors
D. power failures
A. Filter
B. Recovery
C. Security
D. Scalability
A. transaction recovery
B. database recovery
C. system recovery
D. value recovery
8) The .......... consists of the various applications and database that play a role in a backup and recovery
strategy.
A. Recovery Manager environment
9) In which the database can be restored up to the last consistent state after the system failure?
A. Backup
B. Recovery
C. Both
D. None
10) A ........... is a block of Recovery Manager(RMAN)job commands that is stored in the recovery
catalogue.
A. recovery procedure
B. recovery block
C. stored block
D. stored script
11) In log based recovery, the log is sequence of .........
A. filter
B. records
C. blocks
D. numbers
A. set up
B. registration
C. start up
D. enrolment
A. Disk recovery
B. Shadow paging
C. Dish shadowing
D. Crash recovery
14) Most backup and recovery commands in ........... are executed by server sessions.
A. Backup Manager
B. Recovery Manager
D. Database Manager
15) ........ systems typically allows to replace failed disks without stopping access to the system.
A. RAM
B. RMAN
C. RAD
D. RAID
16) An ......... is an exact copy of a single datafile, archived redo log file, or control file.
A. image copy
B. datafile copy
C. copy log
D. control copy
17) .......... known as memory-style error correcting-code(ECC) organization, employs parity bits.
A. RAID level 1
B. RAID level 2
C. RAID level 3
D. RAID level 4
18) The remote backup site is sometimes called the .......... site.
A. primary
B. secondary
C. ternary
D. to create Schedule.
20) The simplest approach to introducing redundancy is to duplicate every disk is called .....
A. mirroring
B. imaging
C. copying
Answers:
1) C. Two-phase commit
2) A. Recovery measures
3) D. failure recovery
4) C. Security
5) A. disk errors
6) D. Scalability
7) C. system recovery
8) A. Recovery Manager environment
9) B. Recovery
10) D. stored script
11) B. records
12) B. registration
13) B. Shadow paging
14) B. Recovery Manager
15) D. RAID
16) A. image copy
17) B. RAID level 2
18) B. secondary
19) A. to take Backup of the Oracle Database
20) A. mirroring
5) If a transaction obtains a shared lock on a row, it means that the transaction wants to ….. that row.
A. write
B. insert
C. execute
D. read
6) The node where the distributed transaction originates is called the …….
A. local coordinator
B. starting coordinator
C. global coordinator
D. originating node
7) If a transaction obtains an exclusive lock on a row, it means that the transaction wants to ……. that
row.
A. select
B. update
C. view
D. read
9) …….. is a specific concurrency problem wherein two transactions depend on each other for
something.
A. phantom read problem
B. transaction read a problem
C. deadlock
D. locking
10) If a database server is referenced in a distributed transaction, the value of its commit point
strength determines which role it plays in the ………
A. two-phase commit
B. two-phase locking
C. transaction locking
D. checkpoints
11) Transaction ………. ensures that the transaction is being executed successfully.
A. concurrency
B. consistency
C. serializability
D. non-serialiasability
12) The situation in which a transaction holds a data item and waits for the release of data item held
by some other transaction, which in turn waits for another transaction, is called …….
A. serializable schedule
B. process waiting
C. concurrency
D. deadlock
15) In two-phase commit, ………. coordinates the synchronization of the commit or rollback
operations.
A. database manager
B. central coordinator
C. participants
D. concurrency control manager
D. monitor
18) After the nodes are prepared, the distributed transaction is said to be ……
A. in-doubt
B. in-prepared
C. prepared transaction
D. in-node
19) In ………., we have many mini transactions within the main transaction.
A. transaction control
B. chained transaction
C. nested transaction
D. calling transaction
ANSWERS:
1) D. phantom read problem
2) C. confirming an action or triggering a response
3) A. locking
4) A. read
5) D. read
6) C. global coordinator
7) B. update
8) C. read and write
9) C. deadlock
10) A. two-phase commit
11) C. serializability
12) D. deadlock
13) A. two-phase locking
14) C. Forget phase
15) B. central coordinator
16) B. growing phase
17) C. TP monitor
18) A. in-doubt
19) B. chained transaction
20) A. shrinking phase
1) A mechanism which ensures that simultaneous execution of more than one transaction does not
lead to any database inconsistencies is called ……………… mechanism.
A. transaction control
B. transaction management
C. concurrency parallelism
D. concurrency control
2) The transaction wants only to read the data item of the mode is called as …….
A. Exclusive Mode
B. Shared Mode
C. Inclusive Mode
D. Unshared Mode
4) ………… is a program or set of program that interacts with the database at some point in its
execution.
A. A database system
B. A database application
C. Both
D. none
C. storage management
D. query evaluation engine
6) The activity of ensuring atomicity in the presence of Transaction aborts is called ……….
A. transaction control
B. transaction management
C. transaction recovery
D. concurrency control
7) A ………….is a set of rules that state when a transaction may lock or unlock each of the data items in
the database
A. concurrency control
B. transaction control
C. validation control
D. locking protocol
8) ……………… is a collection of programs performing all necessary action associated with a database.
A. Database associated
B. Database administrator
C. Database application
D. Database management system
9) Which protocol permits the release of exclusive locks only at the end of the transaction?
A. Graph-based protocol
B. The strict two-phase locking protocol
11) Which protocol allows a transaction to lock a new data item only if that transaction has not yet
unlocked data item?
A. Graph-based protocol.
B. The strict two-phase locking protocol
C. Two-phase locking protocol
D. Timestamp ordering scheme
12) ………. is a collection of application programs that interact with the database along with DBMS.
A. A database system
B. A database application
C. Database administration
D. Data system
13) …….. ensures that once the transaction completes successfully, the results of the operations
become permanent.
A. serializability
B. synchronizability
C. atomicity
D. durability
14) A ……. contains information for undoing or redoing all the actions performed by the transactions.
A. save point
B. log
C. node
D. commit_point
15) A …………. is a unit of program execution that accesses and possibly updates various data items.
A. DBMS
B. monitor
C. transaction
D. transistor
16) A transaction is an action used to perform some manipulation on data stored in the ……..
A. Memory
B. Record
C. Database
D. All of these
C. running state
D. aborted or committed
18) The two possible communication errors are, Lost messages and …….
A. Network Partitions
B. Lost acknowledgment
C. Timeout
D. log error
19) The only way to undo the effects of a committed transaction is to execute a …….
A. committed transaction
B. compensating transaction
C. supplementary transaction
D. update query
20) In ………., one or more users/programs attempt to access the same data at the same time.
A. concurrency
B. transaction control
C. locking
D. two-phase locking
ANSWERS:
1) D. concurrency control
2) B. Shared Mode
3) C. schedule
4) B. A database application
5) A. recovery management
6) C. transaction recovery
7) D. locking protocol
8) D. Database management system
9) B. Strict two-phase locking protocol
10) D. database recovery
11) C. Two-phase locking protocol
12) A. A database system
13) D. durability
14) B. log
15) C. transaction
16) C. Database
17) C. running state
18) A. Network Partitions
19) B. compensating transaction
20) A. concurrency
1) Commit and rollback are related to ……….
A. data integrity
B. data consistency
C. data sharing
D. data security
2) The transaction wants to edit the data item is called as …….
A. Exclusive Mode
B. Shared Mode
C. Inclusive Mode
D. Unshared Mode
3) For committing a transaction, the DBMS might discard all the records.
A. after image
B. before image
C. log
D. redo log
4) A sophisticated locking mechanism is known as 2-phase locking which includes Growing phase
and …….
A. Shrinking Phase
B. Release phase
C. Commit phase
D. Acquire Phase
5) A Transaction ends
A. only when it is Committed.
B. only when it is Rolled-back
C. when it is Committed or Rolled-back
8) The transactions are always ……… if it always locks a data item in the shared mode before reading
it.
A. well-formed
B. well distributed
C. well locked
D. well shared
10) If a distributed transactions are well-formed and 2-phase locked, then ……………. is the correct
locking mechanism in the distributed transaction as well as in centralized databases.
A. two-phase locking
B. three phase locking
C. transaction locking
D. well-formed locking
11) ……… property will check whether all the operation of a transaction completed or none.
A. Atomicity
B. Consistency
C. Isolation
D. Durability
12) The total ordering of operations across groups ensures ………..of transactions.
A. serializability
B. synchronizability
C. atomicity
D. durability
13) In which state, the transaction will wait for the final statement has been executed?
A. Active
B. Failed
C. Aborted
D. partially committed
16) The …………is responsible for ensuring the correct execution in the presence of failures.
A. Database Manager
B. Transaction Manager
C. Recovery Manager
D. Executive Manager
17) A distributed transaction can be …………. if queries are issued at one or more nodes.
A. fully read-only
B. partially read-only
C. fully read-write
D. partially read-write
18) The distributed transaction can be completely read-only and the transaction is started with a
………. READ ONLY statement.
A. DISTRIBUTED_TRANSACTIONS
B. TRANSACTION
C. SET TRANSACTION
D. READ TRANSACTION
19) The initialization parameter …………….. controls the number of possible distributed transactions
in which a given instance can concurrently participate, both as a client and a server.
A. DISTRIBUTED_TRANSACTIONS
B. TRANSACTION
C. SET TRANSACTION
D. CONTROL TRANSACTION
20) A database administrator can manually force the COMMIT or ROLLBACK of a local …………
distributed transaction.
A. in-force
B. in-doubt
C. in-local
D. in-manual
ANSWERS:
1) B. data consistency
2) A. Exclusive Mode
3) B. before an image
4) A. Shrinking Phase
Answer: Option C
Explanation:
View Answer
Answer: Option D
Explanation:
View Answer
Answer: Option C
Explanation:
View Answer
Answer: Option B
Explanation:
View Answer
Q: The way a particular application views the data from the database that the
application ;uses is a ?
A. Module.
B. Relational model.
C. Schema.
D. Sub schema.
Answer: Option D
Explanation:
View Answer
Answer: Option B
Explanation:
View Answer
Answer: Option B
Explanation:
View Answer
Q: ;A logical schema ?
A. Is the entire database.
B. describe data in terms of relational tables and columns, object-oriented classes,
and XML tags.
C. Describes how data is actually stored on disk.
D. Both (A) and (C)
Answer: Option A
Explanation:
View Answer
Answer: Option A
Explanation:
View Answer
Q: Each of data files has a _____ that describe the way the data is stored in the
file.?
A. File structure
B. Records
C. Fields
D. Database
Answer: Option D
Explanation:
View Answer
Answer: Option D
Explanation:
View Answer
Answer: Option D
Explanation:
View Answer
Answer: Option D
Explanation:
View Answer
Answer: Option D
Explanation:
View Answer
Answer: Option A
Explanation:
View Answer
Answer: Option B
Explanation:
View Answer
View Answer
Answer: Option D
Explanation:
View Answer
Answer: Option A
Explanation:
Q: The basic data type char(n) is a _____ length character string and varchar(n) is
_____ length character.?
A. Fixed equal
B. Equal variable
C. Fixed variable
D. Variable equal
Answer: Option C
Explanation:
View Answer
Answer: Option A
Explanation:
View Answer
Answer: Option B
Explanation:
View Answer
Q: Which one of the following provides the ability to query information from the
database and to insert tuples into delete tuples from and modify tuples in the
database ??
A. DML(Data Manipulation Langauge)
B. DDL(Data Definition Langauge)
C. Query
D. Relational Schema
Answer: Option A
Explanation:
View Answer
Q: Which one of the following is used to define the structure of the relation deleting
relations and relating schemas ??
A. DML(Data Manipulation Langauge)
B. DDL(Data Definition Langauge)
C. Query
D. Relational Schema
Answer: Option B
Explanation:
View Answer
Answer: Option B
Explanation:
View Answer
Answer: Option D
Explanation:
View Answer
Answer: Option D
Explanation:
View Answer
Answer: Option D
Explanation:
View Answer
Answer: Option A
Explanation:
View Answer