1. Which of the following is NOT a valid HTTP status code? A) 301 B) 400 C) 503 D) 609
2 . What is the maximum transmission unit (MTU) size for Ethernet? A) 1500 bytes B) 1000 bytes C) 1200 bytes D) 2000 bytes
3. Which of the following is a type of attack that aims to deplete a system's resources by sending a large volume of traffic? A) Phishing B) DDoS C) Man-in-the-Middle D) SQL Injection
4. Which OSI layer is responsible for routing and forwarding data packets? A) Physical layer B) Network layer C) Transport layer D) Data link layer
5 . What does the acronym RAID stand for? A) Random Access Integrated Drive B) Redundant Array of Independent Disks C) Rapid Application and Infrastructure Deployment D) Remote Access Intrusion Detection
6. What is the purpose of a cron job in Unix-like operating systems? A) To manage user accounts B) To schedule recurring tasks C) To monitor system logs D) To configure network settings
7 . Which programming language is often used for developing artificial intelligence algorithms and applications? A) Java B) Python C) C++ D) Ruby
8. In networking, what does the term "subnetting" refer to? A) Dividing a network into smaller sub-networks B) Configuring a network switch C) Encrypting network traffic D) Connecting two different networks
9. What is the purpose of a SQL injection attack? A) To steal cookies from a website B) To bypass authentication mechanisms C) To overload a server with requests D) To intercept data between a client and server
10. Which data structure is typically used for implementing a LIFO (Last In, First Out) mechanism? A) Queue B) Stack C) Tree D) Linked List
11. Which of the following sorting algorithms has the worst-case time complexity of O(n^2)? A) Merge Sort B) Quick Sort C) Bubble Sort D) Insertion Sort
12. What is the purpose of the TCP three-way handshake? A) To establish a secure connection B) To synchronize sequence numbers C) To verify the integrity of data D) To encrypt data packets
13. Which encryption algorithm is commonly used for securing wireless networks? A) AES B) DES C) RSA D) MD5
14. Which of the following is NOT a valid HTTP request method? A) GET B) POST C) DELETE D) UPDATE
15. What is the maximum number of IP addresses that can be assigned to hosts on a subnet with a subnet mask of 255.255.255.240? A) 14 B) 16 C) 30 D) 32
16. Which of the following is a characteristic of a deadlock situation in operating systems? A) Circular dependency B) Excessive memory usage C) Kernel panic D) CPU overload
17. What is the purpose of the 'volatile' keyword in C programming? A) To declare a variable that can be modified by multiple threads B) To specify that a variable's value may change at any time C) To optimize memory access for a variable D) To declare a variable as a constant
18. Which of the following is a type of testing that checks how well a system performs under heavy load? A) Integration testing B) Stress testing C) Unit testing D) Regression testing
19. What is the function of a firewall in a computer network? A) To prevent unauthorized access B) To encrypt data packets C) To manage network traffic D) To store network configuration settings
20. Which of the following is NOT a characteristic of a distributed system? A) Scalability B) Fault tolerance C) Centralized control D) Interoperability