Instruction
quiz
Question - 170
schedule
Time - 2 hr
quiz
Explanation - Yes
scoreboard
Score - No
HPPSC JOA-IT Post Code- 817 - 4

1. What is the length in bits of an IPv6 address ?

Correct : D
Explanation: An IPv6 address is 128 bits long, which is made up of eight 16-bit fields. Each field contains a hexadecimal number, and is separated by a colon.

2. The concept of IP addresses belongs to the ___ layer of ISO-OSI reference model.

Correct : B
Explanation: The concept of IP addresses belongs to the Network Layer (Layer 3) of the Open Systems Interconnection (OSI) model. The OSI model is a conceptual model that splits communications between systems into seven abstraction layers. The layers are: Physical, Data Link, Network, Transport, Session, Presentation, Application.

3. What is the recommend maximum length of UTP CAT 6 cable?

Correct : D
Explanation: According to the Telecommunications Industry Association (TIA) and Electronic Industries Alliance (EIA) standards, the maximum length of a Cat6 cable segment is 100 meters (328 feet). This length ensures reliable high-speed data transmission for Gigabit Ethernet (1000BASE-T) networks.

4. How many usable IPv4 addresses are there in a network with subnet mask 255.255.255.240 ?

Correct : C
Explanation:

5. Which of the following IPv4 address series is reserved by IANA for private use ?

Correct : B
Explanation: 192.168.0.0/16 is a reserved private network space that includes around 65,000 addresses. This range is made up of the addresses between 192.168.0.0 and 192.168.255.255.

6. In which mode of communication, transmission can occur in both directions, but only in one direction at a time ?

Correct : B
Explanation: Half-duplex is a communication method that allows two devices to communicate with each other, but not at the same time. This means that only one device can transmit and receive data at a time.

7. GSM, UMTS and LTE are the types of

Correct : D
Explanation: GSM, UMTS, and LTE are mobile network technologies that represent the second, third, and fourth generations of mobile networks. GSM stands for Global System for Mobile Communications, UMTS stands for Universal Mobile Telecommunications System, and LTE stands for Long Term Evolution.

8. Which of the following colour wire is not found in UTP cable ?

Correct : D
Explanation: Unshielded-Twisted-Pair (UTP) cables have eight colors: white, orange, green, brown, blue, black, red, and yellow. These colors are used for the individual wires within the cable.

9. Ubuntu, Kali and CdentOS are the popular distributions of which operating system ?

Correct : B
Explanation: Linux is a community-developed, open-source operating system (OS). It's based on Unix and is capable of running on a variety of hardware. Linux is supported on almost every major computer platform, including x86, ARM, and SPARC. Linux is a family of operating systems based on the Linux kernel, which was first released on September 17, 1991 by Linus Torvalds.

10. Which of the following is the built-in web browser for MacOS ?

Correct : C
Explanation: Safari is a web browser developed by Apple for its operating systems. It's the default browser for Apple's macOS, iOS, and iPadOS. Safari is free and comes pre-installed on all Apple computers.

11. What is the command in Linux to list the directory cootents ?

Correct : A
Explanation : The ls command in Linux is used to list the contents of a directory.

12. The ____ mode in Google Chrome browser can be used for private browsing.

Correct : C
Explanation: Incognito mode is a browser setting that prevents your device from saving your browsing history, cookies, and other temporary data. It's also known as private browsing or in-private mode.

13. The famous WanaCry malware is an example of ______

Correct : D
Explanation: WannaCry is an example of crypto ransomware, a type of malware that cybercriminals use to extort money.

14. A _____ is a malware that grabs the keystrokes pressed by the user and sends them to the hacker.

Correct : D
Explanation: A keylogger is a software or hardware component that records everything typed on a computer's keyboard. Keyloggers are also known as keystroke loggers or keyboard captures.

15. Which network security device allows or blocks the incoming and outgoing network traffic based on a defined set of security rules ?

Correct : D
Explanation: A firewall is a network security device that prevents unauthorized access to a network. Firewalls can be hardware, software, software as a service (SaaS), or a virtual private cloud.

16. Which of the following commands in Windows Linux is used to check the status of active network connections ?

Correct : B
Explanation: The netstat command is available on Windows and Linux operating systems and can be used to check the status of active network connections.
Next 1 2 3 4

JOA-IT PREVIOUS PAPERS

HPSSC

HPPSC JOA-IT Post Code- 556
Held on : April-2017
HPPSC JOA-IT Post Code- 626
Held on : 2018
HPPSC JOA-IT Post Code- 817
Held on : 2021

Dr. Y.S. Paramar University - JOA-IT

Y S PARMAR JOA-IT Post Code- 206
Held on : Oct-2021

H.P. High Court - JOA-IT

H.P. High Court - JOA-IT
Held on : April-2023
Copyright © 2023! All right are reserved