Security & Physical Layer (Topology, Network Attack) Interview/Exam Question-Answer

Q.1 Physical or logical arrangement of network is __________.

       A. Topology

       B. Routing

       C. Networking

       D. Controlling

Ans : Topology


Q.2 Which network topology requires a central controller or hub?

       A. Star

       B. Mesh

       C. Ring

       D. Bus

Ans : Star


Q.3 _______ topology requires a multipoint connection.

       A. Star

       B. Mesh

       C. Ring

       D. Bus

Ans : Bus


Q.4 Data communication system spanning states, countries, or the whole world is ________.

       A. LAN

       B. WAN

       C. MAN

       D. PAN

Ans : WAN


Q.5 Data communication system within a building or campus is________.

       A. LAN

       B. WAN

       C. MAN

       D. PAN

Ans : LAN


Q.6 WAN stands for __________.

       A. World area network

       B. Wide area network

       C. Web area network

       D. Web access network

Ans : Wide area network


Q.7 In TDM, slots are further divided into __________.

       A. Seconds

       B. Frames

       C. Packets

       D. Bits

Ans : Frames


Q.8 _____ is the multiplexing technique that shifts each signal to a different carrier frequency.

       A. FDM

       B. TDM

       C. Both FDM & TDM

       D. PDM

Ans : FDM


Q.9 The attacker using a network of compromised devices is known as _____________.

       A. Internet

       B. Botnet

       C. Telnet

       D. D-net

Ans : Botnet


Q.10 Which of the following is a form of DoS attack?

       A. Vulnerability attack

       B. Bandwidth flooding

       C. Connection flooding

       D. All of the above

Ans : All of the above


Q.11 The DoS attack, in which the attacker establishes a large number of half-open or fully open TCP connections at the target host is ________.

       A. Vulnerability attack

       B. Bandwidth flooding

       C. Connection flooding

       D. UDP flooding

Ans : Connection flooding


Q.12 The DoS attack, in which the attacker sends deluge of packets to the targeted host is ________.

       A. Vulnerability attack

       B. Bandwidth flooding

       C. Connection flooding

       D. UDP flooding

Ans : Bandwidth flooding


Q.13 Packet sniffers involve ____________.

       A. Active receiver

       B. Passive receiver

       C. Legal receiver

       D. Partially-active receiver

Ans : Passive receiver


Q.14 Sniffers can be prevented by using _______________.

       A. Wired environment

       B. WiFi

       C. Ethernet LAN

       D. Switched network

Ans : Switched network


Q.15 Firewalls are often configured to block ___________.

       A. UDP traffic

       B. TCP traffic

       C. Sensitive traffic

       D. Best-effort traffic

Ans : UDP traffic


Q.16 In a network, If P is the only packet being transmitted and there was no earlier transmission, which of the following delays could be zero?

       A. Propagation delay

       B. Queuing delay

       C. Transmission delay

       D. Processing delay

Ans : Queuing delay


Leave a Comment