Which OSI layer translates and formats data for application programs?
a) Network b) Session c) Transport d) Presentation
Correct Answer: d) Presentation
Explanation: The presentation layer is responsible for data formatting and translation for applications.
Question 42
A protocol that resolves domain names into IP addresses.
a) HTTP b) DNS c) FTP d) IP
Correct Answer: b) DNS
Explanation: The Domain Name System (DNS) translates domain names into IP addresses for routing purposes.
Question 43
Which encryption protocol is often used for secure web communication?
a) FTP b) SSH c) SSL d) Telnet
Correct Answer: c) SSL
Explanation: SSL (Secure Sockets Layer) is used to encrypt data during secure web communications.
Question 44
A device that connects two networks and forwards packets based on IP addresses.
a) Switch b) Hub c) Router d) Repeater
Correct Answer: c) Router
Explanation: A router forwards packets between two or more networks based on their IP addresses.
Question 45
What is the main advantage of a mesh topology?
a) It is easy to set up b) It provides redundancy and fault tolerance c) It is cost-effective d) It requires fewer cables
Correct Answer: b) It provides redundancy and fault tolerance
Explanation: Mesh topology ensures that if one connection fails, other paths are available, making it highly reliable.
Question 46
A system that prevents malware from executing by identifying known malicious code.
a) IDS b) Firewall c) Antivirus d) VPN
Correct Answer: c) Antivirus
Explanation: Antivirus software scans and identifies malicious code, preventing it from running on the system.
Question 47
What does the acronym “VPN” stand for?
a) Virtual Port Network b) Virtual Private Network c) Virtual Packet Network d) Virtual Protocol Network
Correct Answer: b) Virtual Private Network
Explanation: A VPN provides a secure, encrypted connection over a public network, such as the Internet
Question 48
What is the main purpose of a DMZ in network security?
a) To increase network speed b) To isolate public-facing services from the internal network c) To provide user authentication d) To route data between networks
Correct Answer: b) To isolate public-facing services from the internal network
Explanation: A DMZ (Demilitarized Zone) is used to host public-facing servers while isolating them from the internal network to enhance security.
Question 49
A type of wireless encryption that is considered weak and outdated.
a) WPA2 b) WPA3 c) WEP d) SSL
Correct Answer: c) WEP
Explanation: WEP (Wired Equivalent Privacy) is an outdated encryption method that is vulnerable to attacks.
Question 50
Which wireless protocol is used for short-range communication between devices, such as connecting a phone to a headset?
a) Wi-Fi b) Bluetooth c) NFC d) Zigbee
Correct Answer: b) Bluetooth
Explanation: Bluetooth is a wireless protocol used for short-range communication between devices like smartphones and headsets.