Tag: science & technology

Questions Related to science & technology

Online SBI/HDFC netbanking use which encryption technique?

  1. MD5

  2. MD5-RSA

  3. SSL

  4. AES (Advance DES)


Correct Option: C

How many parties define a digital signature?

  1. 2

  2. 3

  3. 4

  4. Depends on Signature hierarchy


Correct Option: D

You live with your 4 other friends. All have laptops but only one internet connection. Service provider has noted the physical address(MAC address) of your subscribed laptop. How your friends can use internet on their laptops? (Select best option)

  1. By using proxy server.

  2. Using a hub.

  3. User can change their Physical address identical to subscribed laptop.

  4. Apply for another net connection.


Correct Option: C

What is honeypot?

  1. It can hack all systems.

  2. Safe corporate data deposits.

  3. You can download anything from here.

  4. trap for cyber criminals.


Correct Option: D

When you type URL "https"… which port will active during your web session?

  1. 139

  2. 443

  3. 80

  4. 21


Correct Option: B

You are getting unwanted mails in your default outlook email client and you don’t want it. Which port will you ban if don’t want ANY mail?

  1. 443

  2. 139

  3. 110

  4. 80


Correct Option: C

You live with your 4 other friends. All have laptops but only one internet connection. Service provider has noted the physical address(MAC address) of your subscribed laptop. How your friends can use internet on their laptops? (Select best option)

  1. By using proxy server.

  2. Using a hub.

  3. User can change their Physical address identical to subscribed laptop.

  4. Apply for another net connection.


Correct Option: C

You want to see what your PL does online @ home. You somehow know his connection IP address. Which software can help you to know his system's open ports?

  1. Nmap

  2. Switch sniffer

  3. Etherial

  4. Wireshark


Correct Option: A

You are going to open a website. Which attackes can down your website?

  1. DDOS

  2. Echo attack

  3. Unlimited pings

  4. Botting


Correct Option: A