Network Engineer Questions


Q:

Autocorrect was originally designed to replace

A) Misspelled words B) Grammatically incorrect
C) Repetitive words D) All of the above
 
Answer & Explanation Answer: A) Misspelled words

Explanation:

autocorrect_was_originally_designed_to_replace1561613833.jpg image

 

Autocorrect was originally designed to replace Misspelled words. Its purpose is as part of the spell checker to correct common spelling or typing errors, saving time for the user. It is commonly found in word processors and text editing interfaces for smartphones, computers, etc.

Report Error

View Answer Report Error Discuss

4 1977
Q:

Zip files use what type of compression?

A) Lossless B) Lossy
C) Any of the above D) None of the above
 
Answer & Explanation Answer: A) Lossless

Explanation:

ZIP file is an archive file format that supports lossless data compression. Lossless is a fairly popular data compression method that is used in a number of different applications. Files can become corrupted when they are transferred over the internet in an uncompressed format. It enables devices to transmit or store the same amount of data in fewer bits.

Report Error

View Answer Report Error Discuss

4 1408
Q:

Availability management is responsible for availability of

A) IT infrastructure B) Tools
C) Processes D) All of the above
 
Answer & Explanation Answer: D) All of the above

Explanation:

ITIL Availability Management aims to define, analyze, plan, measure and improve all aspects of the availability of IT services. It is is responsible for ensuring that all IT infrastructure, processes, tools, roles etc are appropriate for the agreed availability targets.

Report Error

View Answer Report Error Discuss

5 1668
Q:

What is meant by a dedicated computer?

A) Which is assigned one and only one task B) Which is meant for application software
C) Which is used by one person only D) Which uses one kind of software
 
Answer & Explanation Answer: A) Which is assigned one and only one task

Explanation:

What_is_meant_by_a_dedicated_computer1560341069.jpg image

It is a single computer in a network reserved for serving the needs of the network.

Report Error

View Answer Report Error Discuss

0 1213
Q:

Social engineering attacks are best identified by

A) Ransomware B) Phishing
C) Both A & B D) None of the above
 
Answer & Explanation Answer: C) Both A & B

Explanation:

Social engineering is the art of tricking users into performing certain harmful activities or attacks, users must be trained to identify social engineering. Social engineering attacks typically involve some form of psychological manipulation, fooling otherwise unsuspecting users or employees into handing over confidential or sensitive data. Commonly, social engineering involves email or other communication that invokes urgency, fear, or similar emotions in the victim, leading the victim to promptly reveal sensitive information, click a malicious link, or open a malicious file. Because social engineering involves a human element, preventing these attacks can be tricky for enterprises.

 

Report Error

View Answer Report Error Discuss

0 2618
Q:

Transmission data rate is decided by

A) Transport layer B) Network layer
C) Physical layer D) Data link layer
 
Answer & Explanation Answer: C) Physical layer

Explanation:

The speed of the transmission data is generally determined by the cables or connectors we use for data transmission. In networking, layer-1 the physical is which deals with the network cables like pins, usb, connectors, etc... we use for data transmission.

Report Error

View Answer Report Error Discuss

Filed Under: Networking
Exam Prep: AIEEE , Bank Exams
Job Role: Analyst , Bank Clerk , IT Trainer , Network Engineer

18 18535
Q:

IP address is currently

A) 4 bytes long B) available in plenty
C) 6 bytes long D) not assigned as it is all used up
 
Answer & Explanation Answer: A) 4 bytes long

Explanation:

IP address is currently 4 bytes long. An IP address is written in "dotted decimal" notation, which is 4 sets of numbers separated by period each set representing 8-bit number ranging from (0-255).

Report Error

View Answer Report Error Discuss

1 1934
Q:

Cache memory is a form of ROM.

A) TRUE B) FALSE
Answer & Explanation Answer: B) FALSE

Explanation:

The given sentence Cache memory is a form of ROM is FALSE. Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access more quickly than it can access regular random access memory (RAM).

Report Error

View Answer Workspace Report Error Discuss

1 2250