0% found this document useful (0 votes)
16 views75 pages

Engy2 Merged

ggg

Uploaded by

meromero120201
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views75 pages

Engy2 Merged

ggg

Uploaded by

meromero120201
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 75

Networking Fundamentals: DNS and

Virtualization

Your Name:

1. Who is responsible for the security of deployed


applications and data in a cloud infrastructure?

A. The cloud provider

B. The company owning the applications and data

C. The general public

D. A third-party security service

2. What is the primary characteristic of a public cloud


infrastructure?

A. It is used exclusively by a specific group of organizations

B. It is a combination of two or more deployment models

C. It is owned and managed by a single organization

D. It is open to use by the general public

3. What is a common feature of a hybrid cloud


infrastructure?

A. It is used exclusively by a specific group of organizations

B. It is open to use by the general public

C. It is owned and managed by a single organization

D. It enables data and application portability


4. What is the primary characteristic of a private cloud
infrastructure?

A. It is open to use by the general public

B. It is used exclusively by a single organization

C. It is used exclusively by a specific group of organizations

D. It is a combination of two or more deployment models

5. What is the primary characteristic of a community cloud


infrastructure?

A. It is a combination of two or more deployment models

B. It is used exclusively by a specific group of organizations

C. It is open to use by the general public

D. It is used exclusively by a single organization

6. What determines the ownership and management of a


private cloud infrastructure?

A. The cloud provider

B. The general public

C. The organization or a third party (or a combination of both)

D. A specific group of organizations

7. What is the primary function of the Domain Name


System (DNS)?

A. To manage email servers and cloud computing

B. To provide a distributed lookup table of hostname to IP address

C. To manage cloud infrastructure and provide economies of scale

D. To manage virtualization of operating systems


8. What is the main difference between Virtualization and
Dual Boot?

A. Virtualization runs multiple OS at the same time, while Dual Boot


runs only one OS at a time
B. Virtualization is used for cloud computing, while Dual Boot is used
for personal computers
C. Virtualization is used for large-scale applications, while Dual Boot is
used for small-scale applications

D. Virtualization runs only one OS at a time, while Dual Boot runs


multiple OS at the same time

9. What is a benefit of Virtualization in terms of hardware?

A. Only newer hardware is supported

B. Hardware is no longer needed

C. Legacy hardware is no longer supported

D. Legacy hardware is still supported

10. What is the value of cloud computing in terms of


scalability?

A. It is limited to the resources available on a local network

B. It is fixed and cannot be changed

C. It is limited to the resources available on a single machine

D. It is elastic enough to scale with the needs of your organization

11. What is an example of Software as a Service (SaaS) in


cloud computing?

A. A company providing cloud infrastructure to customers

B. A customer using an application running on a cloud infrastructure

C. A company managing its own cloud infrastructure

D. A customer deploying applications on a cloud infrastructure


12. What is the key difference between Platform as a
Service (PaaS) and Infrastructure as a Service (IaaS)?

A. PaaS is used for large-scale applications, while IaaS is used for


small-scale applications
B. PaaS provides access to infrastructure, while IaaS provides access to
applications

C. PaaS is used for small-scale applications, while IaaS is used for


large-scale applications
D. PaaS provides access to applications, while IaaS provides access to
infrastructure

13. Who is responsible for the security of applications and


data in Infrastructure as a Service (IaaS)?

A. The customer

B. A third-party security company

C. The cloud provider

D. A government agency

14. What is a key benefit of cloud computing in terms of


cost?

A. Variable costs that are difficult to predict

B. Cost savings due to economies of scale and reduced infrastructure


needs
C. Higher costs due to the need for new hardware and infrastructure

D. Fixed costs that cannot be changed


Distributed Systems

Your Name:

1. What is a distributed system?

A. A single computer that performs all tasks

B. A centralized system with a single point of failure

C. A collection of independent components located on a single machine

D. A group of computers working together to appear as a single


computer

2. What is a key advantage of a distributed system


compared to a centralized system?

A. Ability to tolerate failures and scale for many users

B. Easier to understand and simpler architecture

C. Faster performance for a single user

D. More complex architecture

3. Why are distributed systems important in modern


applications?

A. Because they are slower and less reliable

B. Because they provide a single interface to the end-user

C. Because they are more complex and scalable

D. Because they are easier to understand


4. What is a characteristic of a distributed system?

A. It is only used for cloud computing

B. State is divided over multiple computers

C. State is stored on a single computer

D. It is only used for real-time tracking systems

5. What is an example of a distributed system?

A. A centralized system with a single point of failure

B. A single computer with multiple processors

C. A network of computers communicating with each other

D. A system that only uses cloud computing

6. What is required for a distributed system to function?

A. A network that connects all components

B. A centralized system with a single point of failure

C. A system that only uses cloud computing

D. A single computer with multiple processors

7. What is communicated between machines in a


distributed system?

A. Only databases

B. Only real-time tracking data

C. Forms of data such as databases, objects, and files

D. Only cloud computing data


8. What is important for reliable communication in a
distributed system?

A. The type of software used

B. The way messages are communicated reliably

C. The type of hardware used

D. The speed of the network

9. What was the primary reason for the creation of


distributed systems?

A. To reduce the need for human management

B. To reduce the cost of machines

C. To increase the complexity of systems

D. To scale services and applications

10. In a client-server architecture, what is the role of the


server?

A. To act as a client to other servers

B. To act as a shared resource for multiple clients

C. To act as a middle tier for processing and decision making

D. To process requests and make decisions

11. What is a characteristic of three-tier architecture?

A. Clients are not required to be intelligent

B. The middle tier is responsible for storing data

C. Clients are responsible for processing and decision making

D. The server is responsible for presentation


12. Which of the following is an example of a multi-tier
architecture?

A. A blockchain network

B. A printer server

C. A peer-to-peer file sharing system

D. Google.com

13. What is a characteristic of peer-to-peer architecture?

A. Each machine can take on both client and server roles

B. The middle tier is responsible for processing and decision making

C. There is a centralized machine that does the heavy lifting

D. The server is responsible for storing data

14. Which of the following is an example of a peer-to-peer


architecture?

A. A blockchain network

B. A web server

C. A three-tier architecture

D. A database server
Networking Fundamentals

Your Name:

1. What is the primary function of a NIC (Network


Interface Card)?

A. To provide power to a network

B. To translate a Mac address to an IP address

C. To enable a device to directly access a network

D. To assign an IP address to a device

2. What type of address is burned onto a NIC card?

A. IP address

B. Logical address

C. Physical address

D. Mac address

3. What is the purpose of protocols in a network?

A. To establish communication rules between devices

B. To connect devices to a network

C. To assign IP addresses to devices

D. To provide security to a network


4. What type of NIC is plugged directly into a
motherboard?

A. Wireless NIC

B. Internal NIC

C. USB-based NIC

D. External NIC

5. What is an example of a protocol?

A. Network adapter

B. HTTP

C. IP address

D. Mac address

6. What is a primary function of computer networks?

A. To provide a platform for standalone computers

B. To connect devices through a single medium

C. To process information independently

D. To share resources and perform certain tasks

7. What type of resource can be shared in a computer


network?

A. Only hardware devices

B. Only software applications

C. Files, devices, and software with multi-user licenses

D. Only internet access


8. What is the purpose of a router in a computer network?

A. To store files and data

B. To connect devices through a wireless medium

C. To connect devices through a wired medium

D. To direct traffic between devices on the network

9. What type of information travels over the network


medium?

A. Messages, such as emails, WhatsApp, and files

B. Only voice and video calls

C. Only emails and files

D. Only software updates

10. What governs the flow of messages across a network?

A. Network devices

B. Network software

C. Network hardware

D. Network protocols
Untitled Quiz

Your Name:

1. What is a type of hardware that enables a device to


directly access the network?

A. Router

B. Hub

C. NIC (Network Interface Card}/network adapter or LAN adapter

D. Switches

2. What is the primary function of a switch in a network?

A. To provide high-speed internet access

B. To connect devices to the internet

C. To connect different networks

D. To allow different nodes to communicate with each other

3. What is the main difference between a LAN and a WAN?

A. LAN is faster, WAN is slower

B. LAN is for homes, WAN is for businesses

C. LAN is under administrative control, WAN is not

D. LAN is smaller, WAN is larger


4. What is the purpose of protocols in a network?

A. To provide internet access

B. To connect devices to a switch

C. To provide network security

D. To enable data to flow from one node to another

5. What is the OSI reference model?

A. A type of network topology

B. A model for developing universal network protocols

C. A protocol suite developed by Microsoft

D. A standard protocol for internet communication

6. What is the primary advantage of the TCP/IP protocol?

A. It is only used for internet communication

B. It is a proprietary protocol

C. It is a type of network topology

D. It is open-standard and cross-platform

7. What is the main difference between TCP/IP and OSI


models?

A. TCP/IP is a reference model, OSI is a protocol suite

B. TCP/IP is a proprietary protocol, OSI is an open-standard protocol

C. TCP/IP is a protocol suite, OSI is a reference model

D. TCP/IP is used for internet communication, OSI is used for local


networks
8. What is the current version of the TCP/IP protocol used
in the internet?

A. TCP/IP v6

B. TCP/IP v5

C. TCP/IP v4

D. TCP/IP v3
Computer Network Layers

Your Name:

1. What is the primary function of the Network Access


Layer?

A. Defining the electrical and mechanical aspects of transmission

B. Routing of data between hosts

C. Error notification and hop-to-hop addressing

D. Providing a logical interface between the end system and network

2. What is the purpose of the IP Layer?

A. Providing a logical interface between the end system and network

B. Defining the electrical and mechanical aspects of transmission

C. Providing connectivity and path selection between two hosts

D. Error notification and hop-to-hop addressing

3. What is the purpose of ICMP (Ping)?

A. Assigning IP addresses to devices

B. Defining the electrical and mechanical aspects of transmission

C. Testing connectivity between hosts

D. Providing a logical interface between the end system and network


4. How many bits are in an IPv4 address?

A. 48

B. 16

C. 128

D. 32

5. What is the purpose of a Physical Address (MAC


address)?

A. Identifying devices at the data link layer

B. Defining the electrical and mechanical aspects of transmission

C. Routing data between hosts

D. Providing a logical interface between the end system and network

6. What are the three ways to assign an IP address to a


device?

A. Manual, DHCP, and ARP

B. Manual, DNS, and FTP

C. Manual, HTTP, and FTP

D. Manual, Automatic, and APIPA

7. What is the maximum number of possible IPv6


addresses?

A. 340 trillion

B. 340 undecillion

C. 340 billion

D. 340 gazillion
8. What is the command to find your private IP?

A. Ipconfig /release

B. Ipconfig /all

C. GetMac

D. Ipconfig
Computer Networking and Remote Access

Your Name:

1. What is the purpose of the SMTP protocol?

A. To send messages between mail servers or email clients

B. To connect devices to the existing internet infrastructure

C. To collect email messages from a mail server

D. To retrieve only message headers

2. Which mail protocol is used to download messages on


the hard disk and keep the user's quota on the server?

A. IMAP4

B. RDP

C. SMTP

D. POP3

3. What is the main aim of the Internet of Things (IOT)?

A. To enable remote connections to other computers

B. To send messages between mail servers or email clients

C. To connect all devices to the existing internet infrastructure

D. To retrieve only message headers


4. What is the function of a Mail Server?

A. To send messages between mail servers or email clients

B. To collect email messages from a mail server

C. To connect devices to the existing internet infrastructure

D. To store and manage email messages

5. What is the protocol used by Microsoft for remote


connections to other computers?

A. Telnet/SSH

B. RDP

C. SMTP

D. POP3

6. Which of the following is NOT a practical application of


IOT?

A. Smart Homes

B. Email management

C. Healthcare management

D. Energy management

7. What is the primary function of the Transport Layer in


the OSI model?

A. To assign and control port numbers

B. To translate human-readable names into IP addresses

C. To support the delivery of web pages to the client

D. To provide communication between processes or applications


8. Which of the following port number ranges is assigned
and controlled by ICANN?

A. 49,152 to 65,535

B. 65,536 to 80,000

C. 0 to 1,023

D. 1,024 to 49,151

9. What is the primary purpose of the Application Layer in


the OSI model?

A. To provide reliable data transfer between hosts

B. To translate human-readable names into IP addresses

C. To assign and control port numbers

D. To communicate between processes or applications

10. What is the protocol used for transmitting web pages


to the client?

A. HTTP

B. FTP

C. SMTP

D. DNS

11. What is the purpose of DNS (Domain Name Servers)?

A. To communicate between processes or applications

B. To translate human-readable names into IP addresses

C. To assign and control port numbers

D. To provide reliable data transfer between hosts


12. What is the purpose of FTP (File Transfer Protocol)?

A. To provide communication between processes or applications

B. To translate human-readable names into IP addresses

C. To support the delivery of web pages to the client

D. To provide reliable data transfer between hosts

13. What is the protocol used for accessing remote


computers?

A. Telnet/SSH

B. FTP

C. HTTP

D. DNS

14. What is the purpose of a URL?

A. To assign and control port numbers

B. To provide reliable data transfer between hosts

C. To translate human-readable names into IP addresses

D. To identify the location of a resource on a network


Computer Networks Elements

Your Name:

1. What type of address is unique to each device on a


network?

A. MAC address

B. HTTP address

C. URL

D. IP address

2. What is the purpose of a repeater in a network?

A. To connect different networks together

B. To connect devices to a wired network

C. To allow devices to communicate at the same time

D. To regenerate the signal before it becomes too weak

3. What is the primary function of a router?

A. To allow devices to communicate at the same time

B. To connect different networks together

C. To regenerate the signal over a network

D. To connect different nodes in the same network


4. What is the characteristic of a Wide Area Network
(WAN)?

A. A group of computers connected via wired connections

B. A small geographical area, such as a school

C. A large geographical area, such as a country

D. A group of computers connected via wireless

5. What is the purpose of a switch in a network?

A. To allow devices to communicate at the same time

B. To connect different nodes in the same network

C. To connect different networks together

D. To regenerate the signal over a network

6. What is an Access Point (AP) in a network?

A. A device that regenerates the signal over a network

B. A physical location where Wi-Fi access is available

C. A device that connects devices to a wired network

D. A device that connects different networks together

7. What is the primary function of a Network Interface


Card (NIC)?

A. To enable a device to directly access a network

B. To allow devices to communicate with each other

C. To connect different networks together

D. To regenerate the signal over a network


8. What is the characteristic of a Local Area Network
(LAN)?

A. A group of computers connected in a large geographical area

B. A group of computers connected in a small geographical area

C. A group of devices connected via wired connections

D. A group of devices connected via wireless

9. Who owns the Internet?

A. IETF (Internet Engineering Task Force)

B. One single organization

C. ISOC (Internet Society)

D. Many organizations, ISPs, companies, and governments

10. What is a characteristic of a Peer-to-Peer network?

A. Some nodes are dedicated to providing services

B. Dedicated servers provide services to clients

C. All nodes are equal and use resources equally

D. Nodes are connected in a hierarchical structure

11. What is the purpose of protocols in computer


networks?

A. To enable efficient communication between devices

B. To provide internet access

C. To manage network resources

D. To provide security to the network


12. What is the OSI Reference Model used for?

A. To optimize network performance

B. To provide universal concepts for protocol development

C. To develop the Internet

D. To manage network devices

13. What is TCP/IP?

A. A type of network cable

B. A network device

C. A network architecture model

D. A network protocol suite

14. What is the main difference between TCP/IP and OSI


models?

A. TCP/IP is a protocol suite, OSI is a reference model

B. TCP/IP is used for LANs, OSI is used for WANs

C. OSI is a protocol suite, TCP/IP is a reference model

D. TCP/IP is used for WANs, OSI is used for LANs

15. What is the function of the Physical Layer in the OSI


model?

A. Defines electrical, mechanical, and transmission medium

B. Hop-to-hop addressing and error notification

C. Error detection and correction

D. Logical interface between end systems and networks


16. What is the next version of TCP/IP?

A. TCP/IP v3

B. TCP/IP v7

C. TCP/IP v5

D. TCP/IP v6
Hacking Phases and Techniques

Your Name:

1. What is the primary goal of the reconnaissance phase in


an attack?

A. To gather information about the target

B. To maintain access to the system

C. To exploit the system

D. To scan the network for open ports

2. What type of attack involves modifying the source


address of packets to bypass firewall rules?

A. Buffer overflow attack

B. Spoof attack

C. HiJack attack

D. Phishing attack

3. What is the term for the ability to influence the


behavior of a group of people?

A. Social engineering

B. Spoofing

C. HiJacking

D. Phishing
4. What type of attack involves sending more data to an
application than is expected?

A. Buffer overflow attack

B. Phishing attack

C. HiJack attack

D. Spoof attack

5. Which type of attack involves creating a fake web page


to persuade users to enter sensitive information?

A. Phishing attack

B. HiJack attack

C. Buffer overflow attack

D. Spoof attack

6. What type of attack involves taking over a session


between two individuals?

A. HiJack attack

B. Buffer overflow attack

C. Phishing attack

D. Spoof attack

7. Who is typically involved in an insider attack?

A. A hacker from the outside

B. A disgruntled employee

C. A network engineer

D. A system administrator
8. What is the goal of the maintaining access phase in an
attack?

A. To retain ownership of the system

B. To exploit the system

C. To scan the network for open ports

D. To cover tracks

9. What is the goal of a password attack?

A. To spread a virus or worm

B. To launch a denial of service attack

C. To install a backdoor or Trojan Horse

D. To gain administrative access to the system

10. What is a Trojan Horse?

A. A program with hidden side-effects, allowing indirect access

B. A type of backdoor or secret entry point

C. A type of denial of service attack

D. A type of virus that replicates itself

11. What is the primary goal of a ransomware attack?

A. To launch a distributed denial of service attack

B. To crash the system and consume resources

C. To gain administrative access and install a backdoor

D. To lock or encrypt data, demanding a ransom in return


12. What is a zombie in the context of cyber security?

A. A type of denial of service attack

B. A type of virus or worm

C. A program that secretly takes over another networked computer

D. A type of Trojan Horse or backdoor

13. What is the primary difference between a virus and a


worm?

A. A worm is a type of Trojan Horse

B. A worm is a type of virus

C. A virus replicates itself, while a worm does not

D. A virus requires user interaction, while a worm does not

14. What is the goal of a denial of service (DoS) attack?

A. To crash the system and consume resources

B. To spread a virus or worm

C. To launch a ransomware attack

D. To gain administrative access to the system

15. What is a common use of zombie computers?

A. To launch a distributed denial of service attack

B. To spread a virus or worm

C. To gain administrative access to the system

D. To launch a ransomware attack


16. What is a major issue with permanently connected
systems?

A. Lack of security against viruses and worms

B. Lack of security against denial of service attacks

C. Lack of security against ransomware attacks

D. Lack of security against permanently connected systems


Computer Security Threats

Your Name:

1. What is the term used to describe an individual or


organization responsible for sending spam?

A. Spyware

B. Spammer

C. Phisher

D. Hacker

2. What is the primary function of a Firewall?

A. To control the traffic between networks and prevent unauthorized


access

B. To intercept internal user requests and process them on behalf of


the user
C. To block all incoming and outgoing internet traffic

D. To tunnel traffic between two sides of a network

3. What type of threat can overload ISPs, email servers,


and individual end-user systems?

A. Spam

B. Spyware

C. Viruses

D. Trojan Horses
4. What is the term used to describe a program that
gathers personal information from a computer without
permission?

A. Trojan Horse

B. Spyware

C. Worm

D. Virus

5. What is the primary function of a Proxy Server?

A. To filter out specific types of attacks

B. To watch network traffic and detect intrusions

C. To tunnel traffic between two sides of a network

D. To intercept internal user requests and process them on behalf of


the user

6. What is the term used to describe a system that


watches network traffic and detects intrusions?

A. NIDS

B. Firewall

C. Proxy Server

D. VPN

7. What is the term used to describe a secure network


connection between two endpoints?

A. VPN

B. NIDS

C. Proxy Server

D. Firewall
8. What is the type of firewall that prevents or allows
access based on IP or MAC addresses?

A. Dynamic Packet Filtering

B. SPI

C. Stateful Packet Filtering

D. Static Packet Filtering

9. What is the primary function of a NIPS?

A. To stop traffic in case of an intrusion

B. To create a baseline of normal traffic

C. To monitor network traffic

D. To encrypt data transmissions

10. What type of firewall is described as a 'deep-packet


inspection firewall'?

A. Next-generation Firewall (NGFW)

B. Stateful firewall

C. Packet-filtering firewall

D. Traditional firewall

11. What is the main purpose of digital signatures?

A. To authenticate the sender's identity

B. To provide confidentiality

C. To encrypt data transmissions

D. To ensure non-repudiation and integrity


12. What is the role of a certification authority in digital
certificates?

A. To issue digital certificates to websites

B. To manage digital signatures

C. To verify the authenticity of digital certificates

D. To generate public and private keys

13. What is the process of converting plaintext into


ciphertext?

A. Digital signing

B. Hashing

C. Decryption

D. Encryption

14. What is the primary purpose of a digital certificate?

A. To verify the integrity of a document

B. To enable digital signatures

C. To authenticate the identity of a website

D. To provide encryption

15. What type of encryption algorithm uses the same key


for both encryption and decryption?

A. Asymmetric encryption

B. Symmetric encryption

C. Hash-based encryption

D. Public-key encryption
16. What is the main advantage of using a NGFW over a
traditional firewall?

A. Increased speed

B. Lower cost

C. Reduced complexity

D. Improved security
Information Security Fundamentals

Your Name:

1. What is the primary goal of confidentiality in


information security?

A. Ensuring that information is not revealed to unauthorized persons

B. Denying access to information and resources

C. Detecting any modification of data

D. Ensuring that data is accessible to all users

2. What is the formula to calculate risk in information


security?

A. Risk = Threat x Vulnerabilities

B. Risk = Threat ÷ Vulnerabilities

C. Risk = Threat + Vulnerabilities

D. Risk = Threat - Vulnerabilities

3. What is the primary purpose of a firewall in information


security?

A. To encrypt data transmission

B. To control incoming and outgoing network traffic

C. To provide virtual private network access

D. To detect and prevent malware attacks


4. What is the key difference between symmetric and
asymmetric key cryptography?

A. Symmetric key is used for encryption, while asymmetric key is used


for decryption

B. Asymmetric key is used for encryption, while symmetric key is used


for decryption
C. Asymmetric key uses two keys, while symmetric key uses one key

D. Symmetric key uses two keys, while asymmetric key uses one key

5. What is the primary focus of security in information


security?

A. Implementing firewalls

B. Risk

C. Encrypting data

D. Preventing cyber attacks

6. What is the reason why it's impossible to totally


eliminate risk in information security?

A. Because users are not aware of security risks

B. Because it's difficult to identify all vulnerabilities

C. Because there are too many types of attacks

D. Because there is no simple solution to securing information

7. What is an example of a passive attack?

A. An attacker scanning the network for open ports

B. An attacker hijacking a session between two individuals

C. An attacker launching a phishing attack

D. An attacker capturing packets from the network and attempting to


decrypt them
8. What is the primary goal of a reconnaissance attack?

A. To hijack a session between two individuals

B. To gather as much information as possible about a target

C. To launch a phishing attack

D. To gain unauthorized access to a system

9. What is the term for the ability of someone or


something to influence the behavior of a group of people?

A. Reconnaissance

B. Phishing

C. Hijacking

D. Social engineering

10. What type of attack involves someone from the inside,


such as a disgruntled employee, attacking the network?

A. Hijacking attack

B. Phishing attack

C. Insider attack

D. Reconnaissance attack

11. What is the term for a fake web page that looks
exactly like a popular website, used to persuade users to
enter sensitive information?

A. Hijacking attack

B. Reconnaissance attack

C. Phishing attack

D. Insider attack
12. What is the term for a hacker taking over a session
between two individuals and disconnecting the other
individual from the communication?

A. Insider attack

B. Phishing attack

C. Hijacking attack

D. Reconnaissance attack

13. What is the primary goal of a scanning attack?

A. To exploit vulnerabilities in the system

B. To gather as much information as possible about a target

C. To hijack a session between two individuals

D. To scan the network with specific information gathered during


reconnaissance

14. What is the term for activities undertaken by a hacker


to extend their misuse of the system without being
detected?

A. Covering tracks

B. Maintaining access

C. Reconnaissance

D. Gaining access
Distributed Systems Overview

Your Name:

1. What is a critical feature of a distributed system?

A. Single machine processing

B. Centralized architecture

C. Scalability

D. Reliability of message communication

2. Why were distributed systems created?

A. To scale services and applications

B. To improve the security of systems

C. To add more machines to a system

D. To reduce the complexity of systems

3. In a three-tier architecture, what is the role of the


middle tier?

A. To do the processing and decision making

B. To store data

C. To act as a client

D. To act as a server
4. What is a characteristic of a peer-to-peer architecture?

A. A centralized machine does the heavy lifting

B. All machines have equal responsibilities

C. Each machine has a specific role

D. Only one machine can act as a server

5. What is an example of a multi-tier system?

A. A single-machine application

B. A blockchain network

C. A local printer

D. Google.com

6. What is the primary advantage of a client-server


architecture?

A. Improved security

B. Scalability

C. Multiple clients can share a resource

D. Reduced complexity

7. What is a primary advantage of a distributed system


over a centralized system?

A. Simpler architecture

B. Improved scalability

C. Better performance for a single user

D. Less complex to understand


8. What is a key characteristic of distributed systems?

A. State is divided over multiple computers

B. Only one interface is available to the end-user

C. All components are located on the same machine

D. State is stored on a single computer

9. Why are distributed systems widely used in modern


applications?

A. They are simpler to understand

B. They are more robust and can tolerate failures

C. They are less scalable

D. They are only used for real-time tracking systems

10. What is an example of a distributed real-time system?

A. Distributed database systems

B. Cloud computing

C. Parallel processing

D. Uber and logistics use real-time tracking systems

11. What is a key requirement for distributed systems to


function?

A. A network that connects all components

B. Only one interface is available to the end-user

C. All components are located on the same machine

D. State is stored on a single computer


12. What is an advantage of distributed systems in terms
of performance?

A. They are less scalable

B. They can be slower for a single user

C. They can maximize resources and information while preventing


failures

D. They are only used for real-time tracking systems

13. What is an example of a distributed system?

A. A cloud computing service model

B. A centralized system

C. A network of computers

D. A single computer

14. What is a key difference between distributed systems


and centralized systems?

A. Distributed systems are more scalable

B. Centralized systems are more robust

C. Centralized systems are more complex

D. Distributed systems are simpler to understand

You might also like