Q91
Q91 What is the main advantage of using FTP over HTTP for file transfer?
Higher security
Better compression
Support for directory listing and manipulation
Faster data transfer
Q92
Q92 What mechanism does HTTP/2 use to reduce latency and improve load times compared to HTTP/1.1?
Data compression
Multiplexing
Encryption
Tokenization
Q93
Q93 How does FTP ensure data is transferred securely?
By using SSL/TLS for encryption
By compressing data
By using checksums for integrity
By using UDP
Q94
Q94 Which feature of HTTP/3 aims to improve performance over lossy or unreliable networks?
QUIC protocol
WebSocket support
Server Push
Content-Encoding
Q95
Q95 In FTP, what is the difference between binary and ASCII transfer modes?
Binary mode transfers files as text, while ASCII mode transfers them as binary
Binary mode compresses data, while ASCII mode does not
Binary mode transfers files in a binary format without conversion, while ASCII mode converts files between different text formats
Binary mode is more secure than ASCII mode
Q96
Q96 How can you download a file from an FTP server using the command line in Linux?
wget [FTP URL]
curl -O [FTP URL]
ftp [FTP URL]
scp [FTP URL]
Q97
Q97 How can you send a custom HTTP header with a curl request?
curl -d "[Header]" [URL]
curl -H "[Header]: [Value]" [URL]
curl --header "[Header]" [URL]
curl --custom-header "[Header]: [Value]" [URL]
Q98
Q98 What command allows you to interactively communicate with an HTTP server using telnet?
telnet [host] 80 followed by GET / HTTP/1.1
telnet [host] 443 followed by CONNECT / HTTP/1.1
telnet [host] 80 followed by POST / HTTP/1.1
telnet [host] 80 followed by HEAD / HTTP/1.1
Q99
Q99 If a web page is not loading correctly, what should be checked first?
Browser cache
Server configuration
DNS settings
Network connectivity
Q100
Q100 A file transfer via FTP fails with a permission error.
What is likely the cause?
Incorrect username or password
Network congestion
File not found on the server
Firewall settings
Q101
Q101 How can you diagnose slow FTP file transfers?
Checking file size and type
Analyzing network bandwidth and congestion
Verifying FTP server load
All of the above
Q102
Q102 What is the primary purpose of a firewall in network security?
To detect and remove viruses
To manage network traffic based on rules
To encrypt data transmissions
To authenticate users
Q103
Q103 Which cryptographic algorithm is commonly used for secure password storage?
RSA
AES
SHA-256
DES
Q104
Q104 What is the function of a digital certificate in network security?
To ensure data integrity
To verify the identity of entities exchanging information online
To compress data
To increase data transfer speed
Q105
Q105 What differentiates symmetric from asymmetric encryption?
The use of one key for encryption and a different key for decryption
The speed of encryption and decryption
The type of algorithms used
The use of a single key for both encryption and decryption
Q106
Q106 In the context of cryptography, what is a nonce?
A unique number used once
A method for encrypting data
A type of digital signature
A protocol for secure communication
Q107
Q107 How does a public key infrastructure (PKI) enhance network security?
By providing digital certificates that verify the ownership of public keys
By encrypting all data on the network
By detecting network intrusions
By managing network traffic
Q108
Q108 What is the primary security concern addressed by HTTPS?
Data corruption
Identity theft
Data interception during transmission
Unauthorized access to network resources
Q109
Q109 What role does the Diffie-Hellman algorithm play in cryptography?
It provides a method for digital signatures
It is used for secure password storage
It enables the secure exchange of encryption keys over a public channel
It encrypts and decrypts data
Q110
Q110 How can you generate a 2048-bit RSA key pair using OpenSSL?
openssl genpkey -algorithm RSA -out private_key.pem 2048
openssl rsa -genkey -out private_key.pem 2048
openssl genrsa -out private_key.pem 2048
openssl rsakey -create -size 2048 -out private_key.pem
Q111
Q111 What command can be used to encrypt a file using AES-256-CBC with OpenSSL?
openssl aes-256-cbc -in plaintext.txt -out encrypted.txt -pass pass:your_password
openssl encrypt -aes-256-cbc -in plaintext.txt -out encrypted.txt -k your_password
openssl enc -aes-256-cbc -in plaintext.txt -out encrypted.txt -k your_password
openssl aes-256-cbc -e -in plaintext.txt -out encrypted.txt -k your_password
Q112
Q112 If an encrypted email cannot be decrypted by the recipient, what should be checked first?
The email client's compatibility with the encryption standard
The correctness of the recipient's public key
The strength of the encryption algorithm
The sender's digital signature
Q113
Q113 How can network administrators detect and mitigate a man-in-the-middle (MitM) attack?
Implementing stronger encryption algorithms
Regularly updating firewall rules
Using digital certificates and HTTPS
Using network monitoring tools
Q114
Q114 Which frequency band is not commonly used by Wi-Fi networks?
2.4 GHz
5 GHz
900 MHz
60 GHz
Q115
Q115 What is the primary purpose of the Mobile IP protocol?
To secure wireless communications
To manage mobile device power consumption
To enable devices to move across networks without losing connectivity
To compress data for faster transmission
Q116
Q116 In the context of mobile computing, what is edge computing?
Processing data in a central data center
Storing data exclusively on the mobile device
Processing data near the source of data generation
Using cloud storage as the only data storage option
Q117
Q117 Which technology underpins the LTE (Long Term Evolution) standard for mobile communication?
GSM
CDMA
OFDMA
TDMA
Q118
Q118 How do MIMO (Multiple Input Multiple Output) technologies improve wireless network performance?
By encrypting data transmissions
By increasing the range of frequencies used
By using multiple antennas for transmission and reception
By compressing the data transmitted
Q119
Q119 What challenge does the hidden node problem pose in wireless networks?
Difficulty in achieving synchronization
Increased risk of data interception
Interference and collision of data transmissions
Excessive energy consumption
Q120
Q120 What is the main advantage of using SDN (Software Defined Networking) in wireless networks?
Enhanced security against cyber threats
Simplified hardware requirements
Flexible network management and configuration
Increased data transfer speeds