0% found this document useful (0 votes)
105 views4 pages

Sample2-Final Exam

This document contains 20 multiple choice questions testing knowledge of networking, cybersecurity, and emerging technologies. The questions cover topics such as TCP/IP layers, IPv6 addressing, UDP vs TCP, cable types, contextual computing, edge computing, virtual reality simulation types, deep learning algorithms, big data analytics, subnetting, IPv4 addressing classes, encryption, password generation, serial vs parallel transmission, signal to noise ratios, malware definitions, public vs private key encryption, the OSI transport layer, IPv4 addressing, and types of malware. The correct answers to each question are also provided.

Uploaded by

abdul basit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
105 views4 pages

Sample2-Final Exam

This document contains 20 multiple choice questions testing knowledge of networking, cybersecurity, and emerging technologies. The questions cover topics such as TCP/IP layers, IPv6 addressing, UDP vs TCP, cable types, contextual computing, edge computing, virtual reality simulation types, deep learning algorithms, big data analytics, subnetting, IPv4 addressing classes, encryption, password generation, serial vs parallel transmission, signal to noise ratios, malware definitions, public vs private key encryption, the OSI transport layer, IPv4 addressing, and types of malware. The correct answers to each question are also provided.

Uploaded by

abdul basit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

1. How many layers are there in the TCP/IP protocol suite?

a. 2
b. 3
c. 4
d. 5
e. 6

2. IPv6 addresses are how many bits long?


a. 32
b. 64
c. 100
d. 128
e. 256

3. UDP provides sequencing, error control and flow control just like TCP
a. True
b. False

4. Which of the following are standard twisted pair cables?


a. CAT 2
b. CAT 3
c. CAT 5
d. All of the above
e. None of the above

5. Which technology uses software and hardware to automatically collect and analyze data
about a device's surroundings, to present relevant, actionable information to the end user?

a. Edge Computing
b. Workplace Hub
c. Contextual Computing
d. 5G Wireless

6. Which technology serves as a centralized IT ecosystem that automates IT processes and


unifies all of user’s existing technologies (including hardware, software, and services)
into a one stop connected platform?

a. Edge Computing
b. Workplace Hub
c. Contextual Computing
d. 5G Wireless

7. Which are simulation types for implementing of virtual reality technology?

a. Non-Immersive
b. Semi-Immersive
c. Fully-Immersive
d. All of the above
e. None of the above

8. Which of the following are Deep Learning Algorithms?


a. Convolutional Neural Network (CNN)
b. Deep Neural Network (DNN)
c. Long Short-Term Memory (LSTM)
d. All of the Above
e. None of the Above

9. Which of the following is the process of examining large and varied data sets to uncover
hidden patterns, correlations, and information to help make business decisions?

a. Internet of Everything (IOE)


b. Big Data Analytics
c. Contextual Computing
d. Mobile Payments

10. Which of the following networks is a subnet?


a. 128.0.0.0
b. 10.0.0.0
c. 192.168.1.0
d. 172.16.64.0

11. In terms of classful IPv4 addressing, what class is the following IPv4 address 75.0.0.7?
a. Class A
b. Class B
c. Class C
d. Class D
e. Class E

12. Decryption is the process of converting plaintext into ciphertext


a. True
b. False
13. Suppose you are creating a simple password for an iPhone and the character set consists
of ten numerals on the keypad: 0, 1, 2, 3,…, 9 and the password length is six digits. Using
the formula P=C password length, what is the number of passwords?

a. 100
b. 1000
c. 10000
d. 1000000

14. Serial transmission is described as transmitting a group of bits at a single instant in time,


which requires multiple paths
a. True
b. False

15. Use the Signal to Noise ratio formula below to solve a scenario where A receiver has an
input power of 22.2 mW while the noise power is 23.3 uW. Find the SNR for the
receiver.

a. 162.35 dB
b. 29.79 dB
c. 19.79 dB
d. 952.79 dB

16. Malware refers to any computer program designed to surreptitiously enter a digital


device.  
a. True
b. False

17. Private-key functions involve the use of two keys during the process of Private-key
encryption.
a. True
b. False

18. Which OSI layer offers reliable, connection-oriented data communication services?
a. application
b. presentation
c. session
d. transport
e. network

19. Which of the following is an IPv4 address?

a. 2001:cdba:0000:0000:0000:0000:3257:9652
b. 172.30.3
c. 164.20.31.9
d. 4004:cdba:0000:0000:0000:0000:3257:8134

20. Which of the following is self-propagating and self-replicating?


a. Virus
b. Worm
c. Denial of service attack
d. CERT
e. None of the above

You might also like