

MCQOPTIONS
Saved Bookmarks
This section includes 25 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Fundamentals knowledge and support exam preparation. Choose a topic below to get started.
1. |
By default, the policy in ___________ Firewall allows all outbound connections and blocks all incoming connections. |
A. | Windows |
B. | Linux |
C. | Mac |
D. | None of the mentioned |
Answer» B. Linux | |
2. |
MongoDB users who use VPNs use ________ rather than IPSEC VPNs for performance issues. |
A. | TTS |
B. | SSL |
C. | LTS |
D. | None of the mentioned |
Answer» C. LTS | |
3. |
On Windows systems _________ command line interface provides access to the underlying Windows Firewall. |
A. | netsh |
B. | netstat |
C. | netln |
D. | SelectIndexes |
Answer» B. netstat | |
4. |
The net.http.RESTInterfaceEnabled setting for mongod enables a fully interactive administrative __________ interface, which is disabled by default. |
A. | Restful |
B. | Rest |
C. | WebService |
D. | All of the mentioned |
Answer» C. WebService | |
5. |
The enabled setting for mongod and mongos instances disables the __________ status page. |
A. | home |
B. | primary |
C. | secondary |
D. | none of the mentioned |
Answer» B. primary | |
6. |
The information that gets transformed in encryption is ____________ |
A. | Plain text |
B. | Parallel text |
C. | Encrypted text |
D. | Decrypted text |
Answer» B. Parallel text | |
7. |
An algorithm in encryption is called _____________ |
A. | Algorithm |
B. | Procedure |
C. | Cipher |
D. | Module |
Answer» D. Module | |
8. |
Security features that control that can access resources in the OS. |
A. | Authentication |
B. | Identification |
C. | Validation |
D. | Access control |
Answer» E. | |
9. |
THE_INFORMATION_THAT_GETS_TRANSFORMED_IN_ENCRYPTION_IS_____________?$ |
A. | Plain text |
B. | Parallel text |
C. | Encrypted text |
D. | Decrypted text |
Answer» B. Parallel text | |
10. |
MONGODB_USERS_WHO_USE_VPNS_USE__________RATHER_THAN_IPSEC_VPNS_FOR_PERFORMANCE_ISSUES.?$ |
A. | TTS |
B. | SSL |
C. | LTS |
D. | None of the mentioned |
Answer» C. LTS | |
11. |
AN_ALGORITHM_IN_ENCRYPTION_IS_CALLED______________?$ |
A. | Algorithm |
B. | Procedure |
C. | Cipher |
D. | Module |
Answer» D. Module | |
12. |
By default, the policy in ___________ Firewall allows all outbound connections and blocks all incoming connections.$ |
A. | Windows |
B. | Linux |
C. | Mac |
D. | None of the mentioned |
Answer» B. Linux | |
13. |
On Windows systems, __________ command line interface provides access to the underlying Windows Firewall? |
A. | netsh |
B. | netstat |
C. | netln |
D. | SelectIndexes |
Answer» B. netstat | |
14. |
Security features that control that can access resources in the OS? |
A. | Authentication |
B. | Identification |
C. | Validation |
D. | Access control |
Answer» E. | |
15. |
On Linux systems, the ________ interface provides access to the underlying netfilter firewall. |
A. | ssip |
B. | iptables |
C. | dns |
D. | all of the mentioned |
Answer» C. dns | |
16. |
CHAP stands for? |
A. | Challenge Handshake authentication protocol |
B. | Challenge Hardware authentication protocol |
C. | Circuit Hardware authentication protocol |
D. | Circuit Handshake authentication protocol |
Answer» B. Challenge Hardware authentication protocol | |
17. |
The ________ setting for mongod and mongos instances changes the main port on which the mongod or mongos instance listens for connections. |
A. | portp |
B. | port |
C. | portIP |
D. | none of the mentioned |
Answer» C. portIP | |
18. |
A concern of authentication that deals with user rights. |
A. | General access |
B. | Functional authentication |
C. | Functional authorization |
D. | Auto verification |
Answer» D. Auto verification | |
19. |
The process of verifying the identity of a user. |
A. | Authentication |
B. | Identification |
C. | Validation |
D. | Verification |
Answer» B. Identification | |
20. |
The ________ setting for mongod and mongos instances limits the network interfaces on which MongoDB programs will listen for incoming connections. |
A. | bindIpmongo |
B. | bind |
C. | bindIp |
D. | revokeip |
Answer» D. revokeip | |
21. |
Which of these is a part of network identification? |
A. | UserID |
B. | Password |
C. | OTP |
D. | fingerprint |
Answer» B. Password | |
22. |
The net.http.RESTInterfaceEnabled setting for mongod enables a fully interactive administrative __________ interface, which is disabled by default |
A. | Restful |
B. | Rest |
C. | WebService |
D. | All of the mentioned |
Answer» C. WebService | |
23. |
Which is not an objective of network security? |
A. | Identification |
B. | Authentication |
C. | Access control |
D. | Lock |
Answer» E. | |
24. |
Network Security provides authentication and access control for resources. |
A. | True |
B. | False |
Answer» B. False | |
25. |
The field that covers a variety of computer networks, both public and private, that are used in everyday jobs. |
A. | Artificial Intelligence |
B. | ML |
C. | Network Security |
D. | IT |
Answer» D. IT | |