Don’t worry, unlock all articles / blogs on PrepInsta by just simply logging in on our website
Notifications Mark All Read
No New notification
July 25, 2023
Question 1
To translate IP addresses into MAC addresses
To translate MAC addresses into IP addresses
To establish a TCP connection between two hosts
To provide security for data transmission
Good Job!
Oops!
The purpose of ARP (Address Resolution Protocol) is to translate MAC addresses into IP addresses. ARP is used by network devices to resolve the MAC address of a device on the same network, given its IP address.
Please login to submit your explanation
Login to see your performance analytics by signing in
Start
Question 2
TCP is connection-oriented, while UDP is connectionless.
TCP is faster than UDP.
TCP is more reliable than UDP.
UDP is used for streaming video, while TCP is used for web browsing
TCP (Transmission Control Protocol) is a connection-oriented protocol that provides reliable, ordered, and error-checked delivery of data between applications. UDP (User Datagram Protocol) is a connectionless protocol that provides no guarantee of delivery, ordering, or error checking. TCP is typically used for applications that require reliable data transfer, such as web browsing and email, while UDP is typically used for applications that require high-speed, low-latency data transfer, such as streaming video and online gaming.
Question 3
cyclic redundancy check
Check repeated code
cyclic repeated code
Code redundancy cycle
Cyclic redundancy check is a coding that is appended to data that enables us to spot any errors that might have happened during data transmission. Errors cannot be corrected by CRC; they can only be detected. Inserted inside the frame trailer is CRC.
Question 4
To ensure that data has been transmitted correctly.
To identify the source and destination of a data packet.
To encrypt data for security purposes.
To compress data for more efficient transmission.
A checksum is a value that is calculated from the data in a data packet. When the data packet is received, the checksum is recalculated and compared to the original checksum. If the two checksums do not match, then the data has been corrupted in transit.
Question 5
To connect two or more networks together.
To route data packets between networks.
To translate between different network protocols.
All of the above.
A gateway is a device that connects two or more networks together. It can also route data packets between networks and translate between different network protocols.
Question 6
To translate human-readable domain names into machine-readable IP addresses.
To store and forward incoming network packets.
To regulate the transmission rate of data packets.
To measure the latency of a network connection.
A DNS server is a computer that stores a database of domain names and their corresponding IP addresses. When a user types a domain name into their web browser, the browser sends a request to a DNS server to resolve the domain name to an IP address.
Question 7
To sniff packets of data on a network.
A packet sniffer is a software program or hardware device that can capture and analyze network traffic. Packet sniffers can be used to troubleshoot network problems, gather security intelligence, or simply monitor network activity.
Question 8
site:Flipkart.comCybersecurity
Flipkart.com-cybersecurity
Flipkart.com"cybersecurity"
Cybersecurityinflipkart.com
The correct format to query the site Flipkart.com about cybersecurity would be: site:flipkart.com cybersecurity This format uses the "site:" operator followed by the domain name (in this case, "flipkart.com") and the keyword "cybersecurity" to specify that you want to search for information about cybersecurity specifically on the Flipkart website.
Question 9
C:\Windows/System32/robots.txt
C:\Windows/WebPages/robots.txt
Flipkart.com/robots.txt
Flipkart.com/admin/robots.txt
The "robots.txt" file is typically located at the root of a website's domain. In the case of Flipkart.com, the correct location for the "robots.txt" file would be: flipkart.com/robots.txt This means that you can access the "robots.txt" file for Flipkart.com by entering the URL "https://www.flipkart.com/robots.txt" in a web browser.
Question 10
LDAP Injection
XML Injection
SQL Injection
OS Commanding
The attack technique used to exploit websites by altering backend database queries by inputting malicious code is called SQL Injection. SQL Injection involves inserting malicious SQL statements into user input fields or other vulnerable areas of a web application to manipulate the underlying database and potentially gain unauthorized access or extract sensitive information.
Please login to report
Get Hiring Updates right in your inbox from PrepInsta