TECH QUIZ - SETB - MEDIUM.pptx ugcufctucigtcci

SahitiDarika 42 views 20 slides Jun 10, 2024
Slide 1
Slide 1 of 20
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20

About This Presentation

Ububb


Slide Content

1. Which of the following is NOT a valid HTTP status code? A) 301 B) 400 C) 503 D) 609

2 . What is the maximum transmission unit (MTU) size for Ethernet? A) 1500 bytes B) 1000 bytes C) 1200 bytes D) 2000 bytes

3. Which of the following is a type of attack that aims to deplete a system's resources by sending a large volume of traffic? A) Phishing B) DDoS C) Man-in-the-Middle D) SQL Injection

4. Which OSI layer is responsible for routing and forwarding data packets? A) Physical layer B) Network layer C) Transport layer D) Data link layer

5 . What does the acronym RAID stand for? A) Random Access Integrated Drive B) Redundant Array of Independent Disks C) Rapid Application and Infrastructure Deployment D) Remote Access Intrusion Detection

6. What is the purpose of a cron job in Unix-like operating systems? A) To manage user accounts B) To schedule recurring tasks C) To monitor system logs D) To configure network settings

7 . Which programming language is often used for developing artificial intelligence algorithms and applications? A) Java B) Python C) C++ D) Ruby

8. In networking, what does the term "subnetting" refer to? A) Dividing a network into smaller sub-networks B) Configuring a network switch C) Encrypting network traffic D) Connecting two different networks

9. What is the purpose of a SQL injection attack? A) To steal cookies from a website B) To bypass authentication mechanisms C) To overload a server with requests D) To intercept data between a client and server

10. Which data structure is typically used for implementing a LIFO (Last In, First Out) mechanism? A) Queue B) Stack C) Tree D) Linked List

11. Which of the following sorting algorithms has the worst-case time complexity of O(n^2)? A) Merge Sort B) Quick Sort C) Bubble Sort D) Insertion Sort

12. What is the purpose of the TCP three-way handshake? A) To establish a secure connection B) To synchronize sequence numbers C) To verify the integrity of data D) To encrypt data packets

13. Which encryption algorithm is commonly used for securing wireless networks? A) AES B) DES C) RSA D) MD5

14. Which of the following is NOT a valid HTTP request method? A) GET B) POST C) DELETE D) UPDATE

15. What is the maximum number of IP addresses that can be assigned to hosts on a subnet with a subnet mask of 255.255.255.240? A) 14 B) 16 C) 30 D) 32

16. Which of the following is a characteristic of a deadlock situation in operating systems? A) Circular dependency B) Excessive memory usage C) Kernel panic D) CPU overload

17. What is the purpose of the 'volatile' keyword in C programming? A) To declare a variable that can be modified by multiple threads B) To specify that a variable's value may change at any time C) To optimize memory access for a variable D) To declare a variable as a constant

18. Which of the following is a type of testing that checks how well a system performs under heavy load? A) Integration testing B) Stress testing C) Unit testing D) Regression testing

19. What is the function of a firewall in a computer network? A) To prevent unauthorized access B) To encrypt data packets C) To manage network traffic D) To store network configuration settings

20. Which of the following is NOT a characteristic of a distributed system? A) Scalability B) Fault tolerance C) Centralized control D) Interoperability
Tags