Which protocol is used to securely transfer files over a network?
a) FTP b) HTTP c) SFTP d) DNS
Correct Answer: c) SFTP
Explanation: SFTP (Secure File Transfer Protocol) is used to securely transfer files over a network, providing encryption to protect data during transmission.
Question 42
Which type of device detects external information and communicates it for processing?
a) Sensor b) Modem c) Firewall d) Switch
Correct Answer: a) Sensor
Explanation: Sensors detect physical information, such as temperature or motion, and communicate it to a system for processing.
Question 43
What is the function of RAID (Redundant Array of Independent Disks) in data storage?
a) To increase the speed of a single disk b) To provide redundancy and improve fault tolerance c) To enable wireless communication d) To connect multiple devices to a network
Correct Answer: b) To provide redundancy and improve fault tolerance
Explanation: RAID combines multiple disks to provide redundancy and improve fault tolerance, ensuring data is not lost if one disk fails.
Question 44
Which of the following describes the main function of a proxy server?
a) To encrypt all network traffic b) To connect different networks c) To act as an intermediary between client requests and the internet d) To block unauthorized users
Correct Answer: c) To act as an intermediary between client requests and the internet
Explanation: A proxy server acts as an intermediary between a client's request and the internet, often used for security and privacy purposes.
Question 45
Which of the following refers to a physical or virtual keyboard being tracked without the user’s knowledge?
a) Spamming b) Keylogging c) Adware d) Phishing
Correct Answer: b) Keylogging
Explanation: Keylogging refers to software or hardware that tracks every keystroke a user makes, typically for malicious purposes.
Question 46
What is the function of a ‘default-deny’ firewall rule?
a) It blocks all traffic unless explicitly allowed b) It allows all traffic unless explicitly denied c) It blocks traffic from specific IP addresses d) It allows all traffic except on specific ports
Correct Answer: a) It blocks all traffic unless explicitly allowed
Explanation: A default-deny firewall rule blocks all incoming or outgoing traffic unless there is an explicit rule to allow it.
Question 47
Which of the following describes ‘greenwashing’ in a corporate context?
a) Misleading customers about the environmental benefits of a product b) Recycling electronic waste c) Implementing eco-friendly practices d) Reducing carbon emissions in production
Correct Answer: a) Misleading customers about the environmental benefits of a product
Explanation: Greenwashing is when a company falsely claims that their products or practices are environmentally friendly to attract customers.
Question 48
Which component stores the BIOS (Basic Input/Output System) in a computer?
a) Hard Drive b) RAM c) ROM d) SSD
Correct Answer: c) ROM
Explanation: The BIOS is stored in the ROM (Read-Only Memory), which retains the data needed for system startup.
Question 49
Which of the following describes the purpose of a firewall in a network?
a) To monitor network trafficL b) To prevent unauthorized access to a network c) To increase network speed d) To store backup data
Correct Answer: b) To prevent unauthorized access to a network Explanation: A firewall blocks unauthorized access to a network while allowing legitimate communication, serving as a security measure.
Question 50
What is the primary benefit of using cloud computing in businesses?
a) Increased internet speed b) Lower upfront infrastructure costs c) Improved physical security d) Access to local storage
Correct Answer: b) Lower upfront infrastructure costs
Explanation: Cloud computing reduces the need for businesses to invest in physical infrastructure by allowing access to scalable, on-demand resources over the internet.