Network Engineer Questions


Q:

Ethernet uses which topology

A) Star B) Bus
C) Twisted pair D) Both B & C
 
Answer & Explanation Answer: B) Bus

Explanation:

Ethernet uses Bus topology.

Report Error

View Answer Report Error Discuss

3 2779
Q:

Who among the following took over as the 25th Director General of the Border Roads(DGBR) ?

A) Lt. Gen. Suresh Sharma B) Lt. Gen. David R. Syiemlieh
C) Lt. Gen. Srikanth Mishra D) Lt. Gen. Sanjeev Kumar Shrivastava
 
Answer & Explanation Answer: D) Lt. Gen. Sanjeev Kumar Shrivastava

Explanation:

Lt. Gen. Sanjeev Kumar Shrivastava took over as the 25th Director General of the Border Roads (DGBR). He has replaced Lt. Gen. Suresh Sharma. Prior to it, he was holding the appointment of Director General Combat Engineers at Integrated Headquarters of Ministry of Defence(Army).

Report Error

View Answer Report Error Discuss

2 2745
Q:

What is a stub network?

A) A network with only one entry and no exit point. B) A network that has only one entry and exit point.
C) A network with more than one exit point. D) A network with more than one exit and entry point.
 
Answer & Explanation Answer: B) A network that has only one entry and exit point.

Explanation:

A stub network has only one default path to non-local hosts and no outside network knowledge. Non-local stub network traffic uses a single logical path when traveling in and out of the network.

 

Stub networks are essentially local area networks (LAN) that either do not connect to the outside and relay data packets internally or are dead-end LANs that know of only one network exit. Stub networks may have multiple connections but use one path to single points of destination.

 

Hence, a stub network is a network that has only one entry and exit point.

Report Error

View Answer Report Error Discuss

3 2719
Q:

Which of the following is an example of system software?

A) Microsoft word B) Calculator
C) Operating system D) RAM
 
Answer & Explanation Answer: C) Operating system

Explanation:

In a brief, the system software is the interface between the hardware and user applications. System software is a type of computer program that is designed to run a computer’s hardware and application programs.

 

Examples : OS, System utilities, BIOS like mouse, keyboard, hard disc, Device drivers, Assembler,...

Report Error

View Answer Report Error Discuss

4 2717
Q:

What is packet filter?

Answer

Packet filter is a standard router equipped with some extra functionality. The extra functionality allows every incoming or outgoing packet to be inspected. Packets meeting some criterion are forwarded normally. Those that fail the test are dropped

Report Error

View answer Workspace Report Error Discuss

Subject: Networking
Job Role: Network Engineer

0 2700
Q:

A Transparent DBMS

A) Keep its logical structure hidden from users B) Can access control
C) Keeps its physical structure hidden from users D) Can not hide sensitive information from users
 
Answer & Explanation Answer: C) Keeps its physical structure hidden from users

Explanation:

DBMS :: Database Managemet System.

A DBMS which keeps its physical structure hidden from the user is known as a transparent DBMS.

Report Error

View Answer Report Error Discuss

2 2671
Q:

Social engineering attacks are best identified by

A) Ransomware B) Phishing
C) Both A & B D) None of the above
 
Answer & Explanation Answer: C) Both A & B

Explanation:

Social engineering is the art of tricking users into performing certain harmful activities or attacks, users must be trained to identify social engineering. Social engineering attacks typically involve some form of psychological manipulation, fooling otherwise unsuspecting users or employees into handing over confidential or sensitive data. Commonly, social engineering involves email or other communication that invokes urgency, fear, or similar emotions in the victim, leading the victim to promptly reveal sensitive information, click a malicious link, or open a malicious file. Because social engineering involves a human element, preventing these attacks can be tricky for enterprises.

 

Report Error

View Answer Report Error Discuss

0 2660
Q:

Programs stored in ROM are called

A) Firmware B) Software
C) Hardware D) None of above
 
Answer & Explanation Answer: A) Firmware

Explanation:

ROM stands for read-only-memory.

 

It's used to store the start-up instructions for a computer, also known as the firmware.

 

Most modern computers use flash-based ROM. It is part of the BIOS chip, which is located on the motherboard.

Report Error

View Answer Report Error Discuss

4 2649