- web.groovymark@gmail.com
- December 6, 2024
Question 01
What is the purpose of a firewall in network security?
A) To increase network bandwidth
B) To block unauthorized access while allowing legitimate communication
C) To store and manage encryption keys
D) To monitor and log data traffic only
Correct Answer: B) To block unauthorized access while allowing legitimate communication
Explanation: A firewall is a security device that monitors and filters incoming and outgoing network traffic to block unauthorized access while permitting legitimate communication.
Question 02
Which of the following storage types is volatile and loses data when the power is turned off?
A) ROM
B) RAM
C) Flash Memory
D) Hard Drive
Correct Answer: B) RAM
Explanation: RAM (Random Access Memory) is volatile, meaning it requires power to retain data. When the power is off, all stored data is lost.
Question 03
Which protocol is used to securely transfer files over a network?
A) FTP
B) HTTP
C) SSH
D) SFTP
Correct Answer: D) SFTP
Explanation: SFTP (Secure File Transfer Protocol) is used to securely transfer files over a network by encrypting the file data during transmission.
Question 04
Which risk management strategy shifts the responsibility of handling a risk to a third party?
A) Risk Acceptance
B) Risk Mitigation
C) Risk Avoidance
D) Risk Transference
Correct Answer: D) Risk Transference
Explanation: Risk transference involves shifting the responsibility for managing the risk to a third party, such as through insurance or outsourcing.
Question 05
What does the term “Big Data” refer to?
A) The process of analyzing small datasets
B) Datasets that are too large and complex to be processed by traditional methods
C) A type of database architecture
D) A network protocol for data transmission
Correct Answer: B) Datasets that are too large and complex to be processed by traditional methods
Explanation: Big Data refers to datasets so large and complex that they require advanced tools and methods for processing and analysis.
Question 06
Which network model allows a user to access both internal resources and external resources provided by third parties?
A) Internet
B) Intranet
C) Extranet
D) VPN
Correct Answer: C) Extranet
Explanation: An extranet is a network that allows authorized external users to access certain internal resources of an organization, while still maintaining security.
Question 07
Which of the following programming languages is commonly used for web development and is considered an interpreted language?
A) C++
B) Java
C) Python
D) JavaScript
Correct Answer: D) JavaScript
Explanation: JavaScript is an interpreted language that is widely used for web development to make interactive and dynamic web pages.
Question 08
Which database operation allows the combination of data from two or more tables?
A) Selection
B) Projection
C) Join
D) Union
Correct Answer: C) Join
Explanation: A join operation in a database combines rows from two or more tables based on a related column between them.
Question 09
What is the main purpose of an operating system?
A) To store files permanently
B) To manage computer hardware and software resources
C) To design graphical interfaces
D) To compile programs
Correct Answer: B) To manage computer hardware and software resources
Explanation: The primary purpose of an operating system is to manage hardware, software resources, and provide common services for computer programs.
Question 10
Which cloud service model provides users with access to software applications over the internet?
A) IaaS
B) PaaS
C) DaaS
D) SaaS
Correct Answer: D) SaaS
Explanation: Software as a Service (SaaS) delivers software applications over the internet, allowing users to access and use them without managing the underlying infrastructure.
Question 11
Which technique allows data to be stored across multiple disks for redundancy and performance improvement?
A) Compression
B) Virtualization
C) Encryption
D) RAID
Correct Answer: D) RAID
Explanation: RAID (Redundant Array of Independent Disks) is a technique used to store data across multiple disks for redundancy and performance improvement.
Question 12
Which type of attack involves overwhelming a network or server with traffic to render it unusable?
A) Man-in-the-middle attack
B) SQL injection
C) Denial-of-service (DoS) attack
D) Phishing attack
Correct Answer: C) Denial-of-service (DoS) attack
Explanation: A DoS attack overwhelms a network or server with excessive traffic, making it unavailable to legitimate users.
Question 13
Which database management task involves ensuring only authorized users can access sensitive data?
A) Query optimization
B) Data backup
C) Data validation
D) Data security
Correct Answer: D) Data security
Explanation: Data security involves measures taken to protect data from unauthorized access, ensuring that only authorized users can access sensitive information.
Question 14
Which of the following is a key component of a database used to uniquely identify a record?
A) Foreign Key
B) Primary Key
C) Index
D) Attribute
Correct Answer: B) Primary Key
Explanation: A primary key is a unique identifier for a record in a database table, ensuring that each record can be uniquely distinguished from others.
Question 15
What type of cloud computing model allows organizations to rent virtualized computing resources such as virtual servers and storage?
A) SaaS
B) IaaS
C) PaaS
D) DaaS
Correct Answer: B) IaaS
Explanation: Infrastructure as a Service (IaaS) allows organizations to rent virtualized computing resources, including virtual servers, storage, and networking over the internet.
Question 16
Which security principle ensures that data remains available to authorized users when needed?
A) Integrity
B) Confidentiality
C) Availability
D) Authentication
Correct Answer: C) Availability
Explanation: Availability ensures that authorized users have reliable access to data and services whenever they are needed.
Question 17
What is the process of extracting, transforming, and loading data into a database for analysis?
A) Data processing
B) Data mining
C) ETL
D) Querying
Correct Answer: C) ETL
Explanation: ETL (Extract, Transform, Load) is the process of extracting data from various sources, transforming it for analysis, and loading it into a database.
Question 18
What does IPv6 offer that IPv4 does not?
A) Faster data transmission speeds
B) More complex routing algorithms
C) Larger address space
D) Increased encryption standards
Correct Answer: C) Larger address space
Explanation: IPv6 offers a significantly larger address space than IPv4, accommodating the growing number of devices connected to the internet.
Question 19
Which security measure prevents unauthorized users from accessing confidential data?
A) Data Integrity
B) Confidentiality
C) Availability
D) Redundancy
Correct Answer: B) Confidentiality
Explanation: Confidentiality ensures that sensitive information is not disclosed to unauthorized users, protecting it from unauthorized access.
Question 20
Which of the following describes a flat-file database?
A) Contains multiple tables with relationships between them
B) Contains a single table with no relationships
C) Organizes data using a tree-like structure
D) Uses keys to link tables
Correct Answer: B) Contains a single table with no relationships
Explanation: A flat-file database consists of a single table with no relationships between data, making it simpler but less efficient than relational databases.