Syllabus
O Level
M1 R5: Information Technology Tools and Network Basics
Introduction to Computers
Office Automation Tools
Internet and Web Technologies
Networking Fundamentals
M2 R5: Web Designing and Publishing
HTML
CSS
Javascript
Web Hosting And Publishing
M3 R5: Programming and Problem Solving through Python
Introduction to Programming
Python Programming
Data Structures in Python
File Processing in Python
M4 R5: Internet of Things (IoT) and Its Applications
Introduction to IoT
IoT Architecture
IoT Applications
IoT Security and Challenges | Soft Skills
Courses
Under Graduate Courses
BA
BCA
B.COM
Post Graduate Courses
MCA
MBA
M.COM
MA
M.SC.(MATHS)
MSW
Institutional Courses
DCA
ADCA
DFA
DOAP
TALLY PRIME
JAVA
PYTHON
CCA
C Languages
Job Oriented Courses
Digital Marketing
Full Stack Development
Data Science
Cybersecurity and Ethical Hacking
Blockchain Development
Cloud Computing
Artificial Intelligence (AI) and Machine Learning
Government Courses
CCC
O LEVEL
A LEVEL
Mock Test
M1 R5: Information Technology Tools and Network Basics
M2 R5: Web Designing and Publishing
M3 R5: Programming and Problem Solving through Python
M4 R5: Internet of Things (IoT) and Its Applications
Old Papers
2025
New!
2024
New!
2023
New!
2022
New!
2021
New!
2020
New!
2019
New!
2018
New!
2017
New!
2016
New!
2015
New!
2014
New!
2013
New!
2012
New!
2011
New!
Assignments
HTML
New!
CSS
New!
Javascript
New!
Python
New!
Log in
Sign Up
O Level Papers!
M1 R5: Information Technology Tools and Network Basics
Networking Fundamentals
Set 12
25
See Explanation !
1
Which of the following are network reliability issues?
नेटवर्क की विश्वसनीयता से जुड़ी समस्याएँ निम्नलिखित में से कौन सी हैं?
Frequency of Failure
recovery time after a failure
catastrophe
All of the above
Next Question
25
See Explanation !
2
When a hacker penetrates a network, this is a network _______ issue
जब कोई हैकर किसी नेटवर्क में प्रवेश करता है, तो यह एक नेटवर्क _______ मुद्दा होता है।
Performance
Reliability
Security
None of the above
Previous Question
Next Question
25
See Explanation !
3
When a server goes down, this is a network _______ issue.
जब कोई सर्वर डाउन हो जाता है, तो यह एक नेटवर्क _______ समस्या है।
Performance
Reliability
Security
None of the above
Previous Question
Next Question
25
See Explanation !
4
When an earthquake severs a fiber-optic cable, this is a network _______ issue
जब कोई भूकंप फाइबर - ऑप्टिक केबल को सीवर करता है, तो यह एक नेटवर्क _______ समस्या है
Performance
Reliability
Security
None of the above
Previous Question
Next Question
25
See Explanation !
5
When a network upgrades to a transmission medium with a data rate that is 100 times faster, this improves the _______ of the network.
जब कोई नेटवर्क 100 गुना तेज डेटा दर के साथ ट्रांसमिशन माध्यम में अपग्रेड होता है, तो यह नेटवर्क के _______ में सुधार करता है।
Performance
Reliability
Security
None of the above
Previous Question
Next Question
25
See Explanation !
6
A company doubles the number of nodes on its network. The greatest impact will be on the _______ of the network
एक कंपनी अपने नेटवर्क पर नोड्स की संख्या को दोगुना कर देती है। सबसे अधिक प्रभाव नेटवर्क के _______ पर पड़ेगा
Performance
Reliability
Security
None of the above
Previous Question
Next Question
25
See Explanation !
7
A company changes its network configuration so that only one router instead of two can access the Internet. The greatest impact will be on the _______ of the network
एक कंपनी अपने नेटवर्क कॉन्फ़िगरेशन को बदलती है ताकि दो के बजाय केवल एक राउटर इंटरनेट का उपयोग कर सके। सबसे अधिक प्रभाव नेटवर्क के _______ पर पड़ेगा
Performance
Reliability
Security
None of the above
Previous Question
Next Question
25
See Explanation !
8
A company requires its users to change passwords every month. This improves the _______ of the network
एक कंपनी को अपने उपयोगकर्ताओं को हर महीने पासवर्ड बदलने की आवश्यकता होती है। यह नेटवर्क के _______ में सुधार करता है
Performance
Reliability
Security
None of the above
Previous Question
Next Question
25
See Explanation !
9
A company buys a computer to serve as a backup to its main server. This will mainly affect the _______ of the network.
एक कंपनी अपने मुख्य सर्वर के बैकअप के रूप में काम करने के लिए एक कंप्यूटर खरीदती है। यह मुख्य रूप से नेटवर्क के _______ को प्रभावित करेगा।
Performance
Reliability
Security
None of the above
Previous Question
Next Question
25
See Explanation !
10
A company requires each employee to power off his computer at the end of the day. This rule was implemented to make the network _______
एक कंपनी को प्रत्येक कर्मचारी को दिन के अंत में अपने कंप्यूटर को बंद करने की आवश्यकता होती है। यह नियम नेटवर्क को _______ बनाने के लिए लागू किया गया था
perform better
more reliable
more secure
more error-free
Previous Question
Next Question
25
See Explanation !
11
What Security trade off occurs while using IDS (Intrusion Detection System)?
आईडीएस (घुसपैठ का पता लगाने वाला सिस्टम) का उपयोग करते समय कौन सा सुरक्षा व्यापार बंद होता है?
Change in permission
Login Failures
Change in privilege
Performance degradation
Previous Question
Next Question
25
See Explanation !
12
EDI (Electronic Data Interchange) use
ईडीआई (इलेक्ट्रॉनिक डेटा इंटरचेंज) का उपयोग
requires an extranet
requires value added network
can be done on internet
requires a corporate intranet
Previous Question
Next Question
25
See Explanation !
13
EDI (Electronic Data Interchange) over internet uses
इंटरनेट उपयोग पर ईडीआई (इलेक्ट्रॉनिक डेटा इंटरचेंज)
MIME to attach EDI forms to e-mail messages
FTP to send business forms
HTTP to send business forms
SGML to send business forms
Previous Question
Next Question
25
See Explanation !
14
For secure EDI (Electronic Data Interchange) transmission on internet
इंटरनेट पर सुरक्षित ईडीआई (इलेक्ट्रॉनिक डेटा इंटरचेंज) ट्रांसमिशन के लिए
MIME is used
S/MIME is used
PGP is used
TCP/IP is used
Previous Question
Next Question
25
See Explanation !
15
EDI (Electronic Data Interchange) standard
ईडीआई (इलेक्ट्रॉनिक डेटा इंटरचेंज) मानक
is not easily available
defines several hundred transaction sets for various business forms
is not popular
defines only a transmission protocol
Previous Question
Next Question
25
See Explanation !
16
A firewall is a
फ़ायरवॉल एक है
wall built to prevent fires from damaging a corporate intranet
security device deployed at the boundary of a company to prevent unauthorized physical access
security device deployed at the boundary of a corporate intranet to protect it from unauthorized access
device to prevent all accesses from the internet to the corporate intranet
Previous Question
Next Question
25
See Explanation !
17
A firewall may be implemented in
फ़ायरवॉल यहाँ लागू किया जा सकता है
routers which connect intranet to internet
bridges used in an intranet
expensive modem
users application programs
Previous Question
Next Question
25
See Explanation !
18
By encryption of a text we mean
किसी टेक्स्ट के एन्क्रिप्शन से हमारा मतलब है
Compressing it
expanding it
scrambling it to preserve its security
Hashing it
Previous Question
Next Question
25
See Explanation !
19
Encryption can be done
एन्क्रिप्शन किया जा सकता है
Only on Textual data
only on ASCII coded data
On any Bit String
only on mnemonic data
Previous Question
Next Question
25
See Explanation !
20
By symmetric key encryption we mean
सममित कुंजी एन्क्रिप्शन से हमारा मतलब है
one private key is used for both encryption and decryption
private and public key used are symmetric
only public keys are used for encryption
only symmetric key is used for encryption
Previous Question
Next Question
25
See Explanation !
21
The Acronym DES stands for
एक्रोनिम DES का मतलब है
Digital Evaluation System
Digital Encryption Standard
Digital Encryption System
Double Encryption Standard
Previous Question
Next Question
25
See Explanation !
22
Public key system is useful because
सार्वजनिक कुंजी प्रणाली उपयोगी है क्योंकि
It uses Two Keys
there is no key distribution problem as public key can be kept in a commonly accessible database.
Private Key can be Kept Secret
It is a Symmetric Key System.
Previous Question
Next Question
25
See Explanation !
23
Hashed message is signed by a sender using
हैश किए गए मैसेज पर एक भेजने वाले ने हस्ताक्षर किए हैं
His Public key
His Private Key
Receivers Public Key
Receivers Public Key
Previous Question
Next Question
25
See Explanation !
24
What does IP mean?
IP का क्या मतलब है?
Instance Principle
Internet Protocol
Instant Protocol
Intellectual Property
Previous Question
Next Question
25
See Explanation !
25
Which of the following is a valid Cyber / Internet Security requirement?
निम्नलिखित में से कौन एक मान्य साइबर / इंटरनेट सुरक्षा आवश्यकता है?
Authentication
Integrity
Confidentiality
All of the given options are correct
Previous Question