Explore topic-wise MCQs in Computer Fundamentals.

This section includes 25 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Fundamentals knowledge and support exam preparation. Choose a topic below to get started.

1.

By default, the policy in ___________ Firewall allows all outbound connections and blocks all incoming connections.

A. Windows
B. Linux
C. Mac
D. None of the mentioned
Answer» B. Linux
2.

MongoDB users who use VPNs use ________ rather than IPSEC VPNs for performance issues.

A. TTS
B. SSL
C. LTS
D. None of the mentioned
Answer» C. LTS
3.

On Windows systems _________ command line interface provides access to the underlying Windows Firewall.

A. netsh
B. netstat
C. netln
D. SelectIndexes
Answer» B. netstat
4.

The net.http.RESTInterfaceEnabled setting for mongod enables a fully interactive administrative __________ interface, which is disabled by default.

A. Restful
B. Rest
C. WebService
D. All of the mentioned
Answer» C. WebService
5.

The enabled setting for mongod and mongos instances disables the __________ status page.

A. home
B. primary
C. secondary
D. none of the mentioned
Answer» B. primary
6.

The information that gets transformed in encryption is ____________

A. Plain text
B. Parallel text
C. Encrypted text
D. Decrypted text
Answer» B. Parallel text
7.

An algorithm in encryption is called _____________

A. Algorithm
B. Procedure
C. Cipher
D. Module
Answer» D. Module
8.

Security features that control that can access resources in the OS.

A. Authentication
B. Identification
C. Validation
D. Access control
Answer» E.
9.

THE_INFORMATION_THAT_GETS_TRANSFORMED_IN_ENCRYPTION_IS_____________?$

A. Plain text
B. Parallel text
C. Encrypted text
D. Decrypted text
Answer» B. Parallel text
10.

MONGODB_USERS_WHO_USE_VPNS_USE__________RATHER_THAN_IPSEC_VPNS_FOR_PERFORMANCE_ISSUES.?$

A. TTS
B. SSL
C. LTS
D. None of the mentioned
Answer» C. LTS
11.

AN_ALGORITHM_IN_ENCRYPTION_IS_CALLED______________?$

A. Algorithm
B. Procedure
C. Cipher
D. Module
Answer» D. Module
12.

By default, the policy in ___________ Firewall allows all outbound connections and blocks all incoming connections.$

A. Windows
B. Linux
C. Mac
D. None of the mentioned
Answer» B. Linux
13.

On Windows systems, __________ command line interface provides access to the underlying Windows Firewall?

A. netsh
B. netstat
C. netln
D. SelectIndexes
Answer» B. netstat
14.

Security features that control that can access resources in the OS?

A. Authentication
B. Identification
C. Validation
D. Access control
Answer» E.
15.

On Linux systems, the ________ interface provides access to the underlying netfilter firewall.

A. ssip
B. iptables
C. dns
D. all of the mentioned
Answer» C. dns
16.

CHAP stands for?

A. Challenge Handshake authentication protocol
B. Challenge Hardware authentication protocol
C. Circuit Hardware authentication protocol
D. Circuit Handshake authentication protocol
Answer» B. Challenge Hardware authentication protocol
17.

The ________ setting for mongod and mongos instances changes the main port on which the mongod or mongos instance listens for connections.

A. portp
B. port
C. portIP
D. none of the mentioned
Answer» C. portIP
18.

A concern of authentication that deals with user rights.

A. General access
B. Functional authentication
C. Functional authorization
D. Auto verification
Answer» D. Auto verification
19.

The process of verifying the identity of a user.

A. Authentication
B. Identification
C. Validation
D. Verification
Answer» B. Identification
20.

The ________ setting for mongod and mongos instances limits the network interfaces on which MongoDB programs will listen for incoming connections.

A. bindIpmongo
B. bind
C. bindIp
D. revokeip
Answer» D. revokeip
21.

Which of these is a part of network identification?

A. UserID
B. Password
C. OTP
D. fingerprint
Answer» B. Password
22.

The net.http.RESTInterfaceEnabled setting for mongod enables a fully interactive administrative __________ interface, which is disabled by default

A. Restful
B. Rest
C. WebService
D. All of the mentioned
Answer» C. WebService
23.

Which is not an objective of network security?

A. Identification
B. Authentication
C. Access control
D. Lock
Answer» E.
24.

Network Security provides authentication and access control for resources.

A. True
B. False
Answer» B. False
25.

The field that covers a variety of computer networks, both public and private, that are used in everyday jobs.

A. Artificial Intelligence
B. ML
C. Network Security
D. IT
Answer» D. IT