Current Affairs APP

Web Technology Questions – Set 13

Dear Aspirants,
Welcome to the Professional Knowledge Section in Affairscloud.com. Here we are providing sample questions in Web Technology. It will be useful for the IBPS SO IT officer and SBI Assistant Manager(System). We have also included some important questions that are repeatedly asked in previous exams.

  1. Which of the following is a set of procedures to recover and protect a business IT infrastructure in the event of a disaster?
    A. Business Resumption Plan
    B. Occupant Emergency Plan
    C. Continuity of Operations Plan
    D. Incident Management Plan
    E. Disaster Recovery Plan
    Answer
    E. Disaster Recovery Plan
    Explanation:
    Disaster Recovery Plan is a documented process or set of procedures to recover and protect a business IT infrastructure in the event of a disaster.

  2. Which is a physical infrastructure through which Internet service providers (ISPs) and Content Delivery Networks (CDNs) exchange Internet traffic between their networks?
    A. Intranet Exchange Point
    B. Extranet Exchange Point
    C. Internet Exchange Point
    D. All of these
    E. None of these
    Answer
    C. Internet Exchange Point
    Explanation:
    An Internet Exchange Point is a physical infrastructure through which Internet service providers (ISPs) and Content Delivery Networks(CDNs) exchange Internet traffic between their networks.

  3. Which of the following is a system of distributed servers that deliver web pages and other web content to a user based on the geographic locations of the user?
    A. Intranet Exchange Point
    B. Extranet Exchange Point
    C. Internet Exchange Point
    D. Content Delivery Network (CDN)
    E. None of these
    Answer
    D. Content Delivery Network (CDN)
    Explanation:
    Content Delivery Network (CDN) is a system of distributed servers that deliver web pages and other web content to a user based on the geographic locations of the user, the origin of the web page and a content delivery server.

  4. GIF images are compressed using which of the following lossless data compression technique to reduce the file size without degrading the visual quality?
    A. DEFLATE
    B. Lempel–Ziv–Oberhumer
    C. Lempel–Ziv–Welch (LZW)
    D. Lempel–Ziv–Oberhumer (LZO)
    E. None of these
    Answer
    C. Lempel–Ziv–Welch (LZW)
    Explanation:
    GIF images are compressed using Lempel–Ziv–Welch (LZW) lossless data compression technique to reduce the file size without degrading the visual quality

  5. Which of the following refers to the study of cipher text with a view to find impacts in them that will permit retrieval of the plaintext from the ciphertext, without necessarily knowing the key or the algorithm?
    A. Encryption
    B. Cryptanalysis
    C. Decryptanalysis
    D. Decryption
    E. None of these
    Answer
    B. Cryptanalysis
    Explanation:
    Cryptanalysis refers to the study of cipher text with a view to find impacts in them that will permit retrieval of the plain text from the cipher text, without necessarily knowing the key or the algorithm

  6. Which of the following is a small program embedded in a GIF Image?
    A. Web bug
    B. Spam
    C. Spyware
    D. Cookie
    E. None of these
    Answer
    A. Web bug
    Explanation:
    Web bug is a small program embedded in a GIF Image.

  7. Which is a commercial disaster recovery service that allows a business to continue computer and network operations in the event of a computer or equipment disaster?
    A. Hot site
    B. Cold Site
    C. Warm Site
    D. All of these
    E. None of these
    Answer
    A. Hot site
    Hot site is a commercial disaster recovery service that allows a business to continue computer and network operations in the event of a computer or equipment disaster

  8. Which of the following is less expensive, but it takes longer to get an enterprise in full operation after the disaster.?
    A. Hot site
    B. Cold Site
    C. Warm Site
    D. All of these
    E. None of these
    Answer
    B. Cold Site
    Explanation:
    Cold site is less expensive, but it takes longer to get an enterprise in full operation after the disaster.

  9. Which of the following is a backup site between a two major backup sites?
    A. Hot site
    B. Cold Site
    C. Warm Site
    D. All of these
    E. None of these
    Answer
    C. Warm Site
    Explanation:
    Warm Site is a backup site between a two major backup sites

  10. Which is a duplicate of the original site of the organization, with full computer systems and also near-complete backups of user data?
    A. Hot site
    B. Cold Site
    C. Warm Site
    D. All of these
    E. None of these
    Answer
    A. Hot site
    Explanation:
    Hot Site is a duplicate of the original site of the organization, with full computer systems and also near-complete backups of user data





Exit mobile version