- web.groovymark@gmail.com
- December 6, 2024
Question 01
What is the purpose of a firewall in network security?
A) To monitor network traffic
B) To prevent unauthorized access to or from a private network
C) To back up data
D) To increase network speed
Correct Answer: B) To prevent unauthorized access to or from a private network
Explanation: A firewall acts as a barrier between a trusted internal network and untrusted external networks, blocking unauthorized access.
Question 02
Which of the following is an example of two-factor authentication?
A) Username and password
B) Password and security questions
C) Password and one-time code sent to a phone
D) Email verification only
Correct Answer: C) Password and one-time code sent to a phone
Explanation: Two-factor authentication requires two separate methods of verification, such as a password and a one-time code sent to a user’s phone.
Question 03
Which database query language is used to retrieve and manipulate data in a relational database?
A) XML
B) SQL
C) HTML
D) JSON
Correct Answer: B) SQL
Explanation: SQL (Structured Query Language) is the standard language used for managing and manipulating data in relational databases.
Question 04
Which cloud service model provides software applications over the internet without the need to install them locally?
A) SaaS
B) PaaS
C) IaaS
D) DaaS
Correct Answer: A) SaaS
Explanation: Software as a Service (SaaS) delivers software applications over the internet, removing the need for local installation or maintenance.
Question 05
What is a common characteristic of open-source software?
A) It is free but cannot be modified
B) It is proprietary and licensed
C) It allows users to modify and distribute the source code
D) It only runs on specific hardware
Correct Answer: C) It allows users to modify and distribute the source code
Explanation: Open-source software is freely available to users and can be modified and redistributed under specific licensing terms.
Question 06
Which type of backup copies only the files that have changed since the last full backup?
A) Full backup
B) Incremental backup
C) Differential backup
D) Partial backup
Correct Answer: B) Incremental backup
Explanation: An incremental backup only backs up files that have changed since the last backup, making it more efficient than a full backup.
Question 07
What does the acronym IoT stand for in technology?
A) Internet of Things
B) Internet of Technology
C) Interface of Tools
D) Integration of Technology
Correct Answer: A) Internet of Things
Explanation: IoT (Internet of Things) refers to a network of connected devices, sensors, and objects that communicate and exchange data over the internet.
Question 08
Which type of network topology connects devices in a circular configuration, passing data in one direction?
A) Star topology
B) Bus topology
C) Ring topology
D) Mesh topology
Correct Answer: C) Ring topology
Explanation: In a ring topology, devices are connected in a circular arrangement, and data travels in one direction around the ring.
Question 09
Which security method uses encryption to convert data into an unreadable format for transmission over a network?
A) Tokenization
B) Firewalls
C) VPN
D) Encryption
Correct Answer: D) Encryption
Explanation: Encryption secures data by converting it into an unreadable format, protecting it during transmission over a network.
Question 10
Which type of cloud computing offers the ability to develop, run, and manage applications without managing the underlying infrastructure?
A) SaaS
B) PaaS
C) IaaS
D) DaaS
Correct Answer: B) PaaS
Explanation: Platform as a Service (PaaS) provides a platform that allows developers to create, run, and manage applications without dealing with the infrastructure.
Question 11
What is the primary function of RAM in a computer system?
A) To store data permanently
B) To store data temporarily for quick access
C) To perform calculations
D) To connect to a network
Correct Answer: B) To store data temporarily for quick access
Explanation: RAM (Random Access Memory) temporarily stores data for quick access while the computer is running, improving system performance.
Question 12
Which of the following is an example of a database management system (DBMS)?
A) Microsoft Word
B) Oracle
C) Adobe Photoshop
D) Python
Correct Answer: B) Oracle
Explanation: Oracle is a database management system (DBMS) used for storing, retrieving, and managing data in a structured way.
Question 13
Which process in computing ensures that only authorized users have access to certain data?
A) Authentication
B) Encryption
C) Backup
D) Validation
Correct Answer: A) Authentication
Explanation: Authentication is the process of verifying the identity of a user to ensure that only authorized individuals can access certain data or systems.
Question 14
What is the purpose of a content delivery network (CDN)?
A) To secure network traffic
B) To improve website loading times by caching content
C) To monitor user activity
D) To restrict access to certain websites
Correct Answer: B) To improve website loading times by caching content
Explanation: A CDN stores cached copies of website content in multiple geographic locations, reducing latency and improving website loading speeds.
Question 15
Which of the following best describes the purpose of SQL injection attacks?
A) To overload a system with excessive traffic
B) To inject malicious code into a web application’s database
C) To steal data during transmission
D) To disrupt a network by flooding it with traffic
Correct Answer: B) To inject malicious code into a web application’s database
Explanation: SQL injection attacks involve inserting malicious SQL code into input fields to manipulate or access the database illegally.
Question 16
What is the primary function of the CPU in a computer system?
A) To store data
B) To process instructions and perform calculations
C) To manage network connections
D) To provide security for the system
Correct Answer: B) To process instructions and perform calculations
Explanation: The CPU (Central Processing Unit) is responsible for executing instructions and performing calculations, acting as the brain of the computer.
Question 17
Which term refers to a unique number assigned to devices on a network for identification and communication?
A) IP address
B) MAC address
C) DNS
D) Subnet
Correct Answer: A) IP address
Explanation: An IP address is a unique number assigned to devices on a network that allows them to communicate and be identified.
Question 18
What is the main purpose of two-factor authentication (2FA)?
A) To encrypt data during transmission
B) To increase the difficulty of unauthorized access
C) To backup data
D) To optimize network speed
Correct Answer: B) To increase the difficulty of unauthorized access
Explanation: Two-factor authentication (2FA) enhances security by requiring two forms of verification, making it harder for unauthorized users to gain access.
Question 19
Which of the following is a characteristic of a relational database?
A) Data is stored in a flat file
B) Data is organized into rows and columns
C) Data is stored in unstructured formats
D) Data is encrypted by defau
Correct Answer: B) Data is organized into rows and columns
Explanation: A relational database organizes data into tables with rows and columns, enabling efficient querying and management.
Question 20
What does the acronym RAID stand for in data storage?
A) Redundant Array of Independent Disks
B) Random Access of Independent Data
C) Reliable Access for Independent Devices
D) Redundant Access of Internal Devices
Correct Answer: A) Redundant Array of Independent Disks
Explanation: RAID (Redundant Array of Independent Disks) is a data storage technology that combines multiple disks to improve performance and provide redundancy.