Syllabus
O Level
M1 R5: Information Technology Tools and Network Basics
Introduction to Computers
Office Automation Tools
Internet and Web Technologies
Networking Fundamentals
M2 R5: Web Designing and Publishing
HTML
CSS
Javascript
Web Hosting And Publishing
M3 R5: Programming and Problem Solving through Python
Introduction to Programming
Python Programming
Data Structures in Python
File Processing in Python
M4 R5: Internet of Things (IoT) and Its Applications
Introduction to IoT
IoT Architecture
IoT Applications
IoT Security and Challenges | Soft Skills
Courses
Under Graduate Courses
BA
BCA
B.COM
Post Graduate Courses
MCA
MBA
M.COM
MA
M.SC.(MATHS)
MSW
Institutional Courses
DCA
ADCA
DFA
DOAP
TALLY PRIME
JAVA
PYTHON
CCA
C Languages
Job Oriented Courses
Digital Marketing
Full Stack Development
Data Science
Cybersecurity and Ethical Hacking
Blockchain Development
Cloud Computing
Artificial Intelligence (AI) and Machine Learning
Government Courses
CCC
O LEVEL
A LEVEL
Mock Test
M1 R5: Information Technology Tools and Network Basics
M2 R5: Web Designing and Publishing
M3 R5: Programming and Problem Solving through Python
M4 R5: Internet of Things (IoT) and Its Applications
Old Papers
2025
New!
2024
New!
2023
New!
2022
New!
2021
New!
2020
New!
2019
New!
2018
New!
2017
New!
2016
New!
2015
New!
2014
New!
2013
New!
2012
New!
2011
New!
Assignments
HTML
New!
CSS
New!
Javascript
New!
Python
New!
Log in
Sign Up
O Level Papers!
M1 R5: Information Technology Tools and Network Basics
Networking Fundamentals
Set 13
25
See Explanation !
1
What does TCP mean?
TCP का क्या मतलब है?
Total Content Positioning
Transmission Control Protocol
Transmittable Constant Protocol
Technical Control Panel
Next Question
25
See Explanation !
2
What are TLS and SSL?
TLS और SSL क्या हैं?
Internet protocols
Network layers
Internet layers
Cryptographic protocols
Previous Question
Next Question
25
See Explanation !
3
What is network topology?
नेटवर्क टोपोलॉजी क्या है?
It is the inner networkings of a single computer.
It is the top layer of a computer network.
It is the framework of the components of a computer network.
It is the entirety of the data of a computer network.
Previous Question
Next Question
25
See Explanation !
4
What is another name for Internet Layer?
इंटरनेट लेयर का दूसरा नाम क्या है?
TCP layer
Interwebs
IP layer
SSL layer
Previous Question
Next Question
25
See Explanation !
5
Which of the following is the collective name for Trojan horses, spyware, and worms?
ट्रोजन हॉर्स, स्पाइवेयर और वर्म का सामूहिक नाम क्या है?
Spware
Botnets
Virus
Malware
Previous Question
Next Question
25
See Explanation !
6
When is encrypted data the safest?
एन्क्रिप्टेड डेटा सबसे सुरक्षित कब होता है?
When it is being transferred via usb stick.
When it is in transit.
When it is being written. When it is at rest.
When it is being written.
Previous Question
Next Question
25
See Explanation !
7
TCP is used for what three main functions?
TCP का उपयोग किन तीन मुख्य कार्यों के लिए किया जाता है?
Connect to the Web, deliver email, and transfer files.
Connect to the Web, compress data, encrypt mail.
Connect to the web, conceal data, transfer files.
Connect to the Web, encrypt data, transmit information.
Previous Question
Next Question
25
See Explanation !
8
Secure cookies have which feature?
सुरक्षित कुकीज़ में कौन सी सुविधा है?
They are not encrypted, just sent via secure server.
They are encrypted.
Secure cookies are passed along via encrypted programs.
Cookies are always traded between trusted users.
Previous Question
Next Question
25
See Explanation !
9
How are port numbers categorized?
पोर्ट संख्याओं को कैसे वर्गीकृत किया जाता है?
Static, dynamic, enigmatic
Known, well-known, unknown
Well-known, registered, and static/dynamic.
Unknown, unregistered, invalid
Previous Question
Next Question
25
See Explanation !
10
What is the top method an attacker might infect a target?
हमलावर किसी लक्ष्य को संक्रमित करने का शीर्ष तरीका क्या हो सकता है?
Social engineering, or psychological manipulation.
SQL injection
Buffer overflow
Hacking via the Internet
Previous Question
Next Question
25
See Explanation !
11
An SQL injection is often used to attack what?
SQL इंजेक्शन का उपयोग अक्सर किस पर हमला करने के लिए किया जाता है?
Small scale machines such as diebold ATMs
Large-scale sequel databases such as those containing credit card information.
Servers running SQL databases similar to Hadoop or Hive.
Servers built on NoSQL
Previous Question
Next Question
25
See Explanation !
12
What is necessary for a cross-site script attack with cookies to be thwarted?
कुकीज़ के साथ क्रॉस - साइट स्क्रिप्ट अटैक को विफल करने के लिए क्या आवश्यक है?
CAPTCHAs
Virtual machines
Proxies
Firewalls
Previous Question
Next Question
25
See Explanation !
13
Which of the following is a VALID authorization key?
निम्नलिखित में से कौन एक मान्य प्राधिकरण कुंजी है?
Public authorization key
Public ephemeral key authorization key
Asymmetric authorization keys
Symmetric authorization keys
Previous Question
Next Question
25
See Explanation !
14
Which of the following is a VALID digital signature key?
निम्नलिखित में से कौन एक मान्य डिजिटल हस्ताक्षर कुंजी है?
Public signature authentication key
Private signature authentication key
Symmetric signature authentication key
Private signature key
Previous Question
Next Question
25
See Explanation !
15
Which of the following is not a VALID type of firewall?
इनमें से कौन - सा फ़ायरवॉल एक मान्य प्रकार का फ़ायरवॉल नहीं है?
Application-level gateways
Circuit-level gateways
Proxy Server Gateways
Packet filters
Previous Question
Next Question
25
See Explanation !
16
Which of the following HTTP method is considered insecure ?
निम्नलिखित में से कौन सी HTTP विधि असुरक्षित मानी जाती है?
POST
DELETE
TRACE
GET
Previous Question
Next Question
25
See Explanation !
17
Which of the following are the ways through which virus spreads?
निम्नलिखित में से कौन से तरीके हैं जिनके माध्यम से वायरस फैलता है?
Floppy Disk
Email attachments
Network connection
All of the above
Previous Question
Next Question
25
See Explanation !
18
Which of the following are categories of spam mails?
निम्नलिखित में से कौन सी स्पैम मेल की श्रेणियां हैं?
Phishing and Fraud
Spoofing mails
Chain mails
All of the Above
Previous Question
Next Question
25
See Explanation !
19
Which of the following are preventive antivirus measures?
निम्नलिखित में से कौन से निवारक एंटीवायरस उपाय हैं?
Do not open attachments from suspicious sources.
Delete chain and junk mails.
Backup your files.
All of the above
Previous Question
Next Question
25
See Explanation !
20
How many keys are required if two parties communicate using Asymmetric Cryptography?
यदि दो पक्ष असममित क्रिप्टोग्राफी का उपयोग करके संवाद करते हैं तो कितनी कुंजियों की आवश्यकता होती है?
One
Two
Three
Four
Previous Question
Next Question
25
See Explanation !
21
What is Phishing?
फ़िशिंग क्या है?
Fraudulently acquiring sensitive information.
An encryption technique
An anti-spam technique
A password building technique
Previous Question
Next Question
25
See Explanation !
22
What is IMAP?
IMAP क्या है?
Internet Messaging Application
Interanet Messaging Application
Interanet Message Access Protocol
Internet Message Access Protocol
Previous Question
Next Question
25
See Explanation !
23
Which of the following are threats to Email Security?
ईमेल सुरक्षा के लिए निम्नलिखित में से कौन से खतरे हैं?
Viruses
Trojans
Spams
All of the above
Previous Question
Next Question
25
See Explanation !
24
Malware is short for
मैलवेयर का संक्षिप्त नाम है
Malicious Software
Malicious Systems
Maliant Software
Maliant Systems
Previous Question
Next Question
25
See Explanation !
25
Which of the following is not a well known anti-virus program?
निम्नलिखित में से कौन एक प्रसिद्ध एंटी - वायरस प्रोग्राम नहीं है?
AVAST
SMAG
AVG
McAFee
Previous Question