MCQOPTIONS
Saved Bookmarks
This section includes 728 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
| 451. |
In Network Management System, a term that responsible for controlling access to network based on predefined policy is called |
| A. | Fault Management |
| B. | Secured Management |
| C. | Active Management |
| D. | Security Management |
| Answer» E. | |
| 452. |
Main difference between SNMPv3 and SNMPv2 is the |
| A. | Management |
| B. | Integration |
| C. | Classification |
| D. | Enhanced security |
| Answer» E. | |
| 453. |
To use Simple Network Management System (SNMP), we need |
| A. | Servers |
| B. | IP |
| C. | Protocols |
| D. | Rules |
| Answer» E. | |
| 454. |
Configuration management can be divided into two subsystems those are |
| A. | Reconfiguration and documentation |
| B. | Management and configuration |
| C. | Documentation and dialing up |
| D. | Both Reconfiguration and documentation and Management and configuration |
| Answer» B. Management and configuration | |
| 455. |
Full duplex mode increases capacity of each domain from |
| A. | 10 to 20 mbps |
| B. | 20 to 30 mbps |
| C. | 30 to 40 mbps |
| D. | 40 to 50 mbps |
| Answer» B. 20 to 30 mbps | |
| 456. |
An application-level protocol in which a few manager stations control a set of agents is called |
| A. | HTML |
| B. | TCP |
| C. | SNMP |
| D. | SNMP/IP |
| Answer» D. SNMP/IP | |
| 457. |
SMI-S Standard uses |
| A. | Java RMI |
| B. | CIM-XML/HTTP |
| C. | CORBA |
| D. | .NET |
| Answer» C. CORBA | |
| 458. |
Task of Distributed Management Task Force is to |
| A. | To promote interoperability among the management solution providers |
| B. | Acts as an interface between the various budding technologies and provide solution to manage various environments |
| C. | Only To promote interoperability among the management solution providers |
| D. | Both To promote interoperability among the management solution providers and Acts as an interface between the various budding technologies and provide solution to manage various environments |
| Answer» E. | |
| 459. |
Effect of open standards like SMI(s) |
| A. | Standardization drives software interoperability and interchange ability |
| B. | Breaks the old-style dependence on proprietary methods, trade secrets, and single providers |
| C. | Builds a strong foundation on which others can quickly build and innovate |
| D. | All of the mentioned |
| Answer» E. | |
| 460. |
Identify the tasks involved in Storage Capacity management |
| A. | Identifying storage systems are approaching full capacity |
| B. | Monitoring trends for each resource |
| C. | Tracking Total capacity, total used, total available |
| D. | All of the mentioned |
| Answer» E. | |
| 461. |
Effective Storage management includes |
| A. | Securities |
| B. | Backups |
| C. | Reporting |
| D. | All of the mentioned |
| Answer» E. | |
| 462. |
How do Storage administrators ensure secure access to storage devices: |
| A. | By using Zoning |
| B. | By putting a physical lock on the storage device |
| C. | By keeping devices shutdown when not in use |
| D. | By keeping devices when used |
| Answer» B. By putting a physical lock on the storage device | |
| 463. |
Identify the difficulties the SAN administrator incur while dealing with diverse vendors |
| A. | Proprietary management interfaces |
| B. | Multiple applications to manage storage in the data center |
| C. | No single view |
| D. | All of the mentioned |
| Answer» E. | |
| 464. |
Which protocols are used for Storage management? |
| A. | SNMP |
| B. | LDAP |
| C. | POP3 |
| D. | MIB |
| Answer» B. LDAP | |
| 465. |
Identify the storage devices |
| A. | Switch |
| B. | RAID Arrays |
| C. | Tape drives |
| D. | All of the mentioned |
| Answer» E. | |
| 466. |
Storage management comprises of |
| A. | SAN Management |
| B. | Data protection |
| C. | Disk operation |
| D. | All of the mentioned |
| Answer» E. | |
| 467. |
Which layer of the OSI reference model does IPsec work at? |
| A. | Layer 1 |
| B. | Layer 2 |
| C. | Layer 3 |
| D. | Layer 4 |
| Answer» D. Layer 4 | |
| 468. |
Which layer of the OSI reference model does PPTP work at? |
| A. | Layer 1 |
| B. | Layer 2 |
| C. | Layer 3 |
| D. | Layer 4 |
| Answer» C. Layer 3 | |
| 469. |
L2F was developed by which company? |
| A. | Microsoft |
| B. | Cisco |
| C. | Blizzard Entertainment |
| D. | IETF |
| Answer» C. Blizzard Entertainment | |
| 470. |
ESP (Encapsulating Security Protocol) is defined in which of the following standards? |
| A. | IPsec |
| B. | PPTP |
| C. | PPP |
| D. | L2TP |
| Answer» B. PPTP | |
| 471. |
Which layer 3 protocols can be transmitted over a L2TP VPN? |
| A. | IP |
| B. | IPX |
| C. | Neither IP or IPX |
| D. | Both IP or IPX |
| Answer» E. | |
| 472. |
VPNs are financially speaking __________ |
| A. | Always more expensive than leased lines |
| B. | Always cheaper than leased lines |
| C. | Usually cheaper than leased lines |
| D. | Usually more expensive than leased lines |
| Answer» D. Usually more expensive than leased lines | |
| 473. |
Traffic in a VPN is NOT ____________ |
| A. | Invisible from public networks |
| B. | Logically separated from other traffic |
| C. | Accessible from unauthorized public networks |
| D. | Restricted to a single protocol in IPsec |
| Answer» D. Restricted to a single protocol in IPsec | |
| 474. |
Which of the following statements is NOT true concerning VPNs? |
| A. | Financially rewarding compared to leased lines |
| B. | Allows remote workers to access corporate data |
| C. | Allows LAN-to-LAN connectivity over public networks |
| D. | Is the backbone of the Internet |
| Answer» E. | |
| 475. |
What protocol is NOT used in the operation of a VPN? |
| A. | PPTP |
| B. | IPsec |
| C. | YMUM |
| D. | L2TP |
| Answer» D. L2TP | |
| 476. |
When were VPNs introduced into the commercial world? |
| A. | Early 80’s |
| B. | Late 80’s |
| C. | Early 90’s |
| D. | Late 90’s |
| Answer» E. | |
| 477. |
A ___________ is an extension of an enterprise’s private intranet across a public network such as the internet, creating a secure private connection. |
| A. | VNP |
| B. | VPN |
| C. | VSN |
| D. | VSPN |
| Answer» C. VSN | |
| 478. |
When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called |
| A. | DNS lookup |
| B. | DNS hijacking |
| C. | DNS spoofing |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 479. |
PGP encrypts data by using a block cipher called |
| A. | International data encryption algorithm |
| B. | Private data encryption algorithm |
| C. | Internet data encryption algorithm |
| D. | None of the mentioned |
| Answer» B. Private data encryption algorithm | |
| 480. |
Pretty good privacy (PGP) is used in |
| A. | Browser security |
| B. | Email security |
| C. | FTP security |
| D. | None of the mentioned |
| Answer» C. FTP security | |
| 481. |
Extensible authentication protocol is authentication framework frequently used in |
| A. | Wired personal area network |
| B. | Wireless networks |
| C. | Wired local area network |
| D. | None of the mentioned |
| Answer» C. Wired local area network | |
| 482. |
An attempt to make a computer resource unavailable to its intended users is called |
| A. | Denial-of-service attack |
| B. | Virus attack |
| C. | Worms attack |
| D. | Botnet process |
| Answer» B. Virus attack | |
| 483. |
WPA2 is used for security in |
| A. | Ethernet |
| B. | Bluetooth |
| C. | Wi-Fi |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 484. |
Which component is included in IP security? |
| A. | Authentication Header (AH) |
| B. | Encapsulating Security Payload (ESP) |
| C. | Internet key Exchange (IKE) |
| D. | All of the mentioned |
| Answer» E. | |
| 485. |
In tunnel mode IPsec protects the |
| A. | Entire IP packet |
| B. | IP header |
| C. | IP payload |
| D. | None of the mentioned |
| Answer» B. IP header | |
| 486. |
IPsec is designed to provide the security at the |
| A. | Transport layer |
| B. | Network layer |
| C. | Application layer |
| D. | Session layer |
| Answer» C. Application layer | |
| 487. |
If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the network. |
| A. | MAC address |
| B. | IP address |
| C. | Both MAC address and IP address |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 488. |
What is DHCP snooping? |
| A. | techniques applied to ensure the security of an existing DHCP infrastructure |
| B. | encryption of the DHCP server requests |
| C. | algorithm for DHCP |
| D. | none of the mentioned |
| Answer» B. encryption of the DHCP server requests | |
| 489. |
After obtaining the IP address, to prevent the IP conflict the client may use |
| A. | internet relay chat |
| B. | broader gateway protocol |
| C. | address resolution protocol |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 490. |
DHCP client and servers on the same subnet communicate via |
| A. | UDP broadcast |
| B. | UDP unicast |
| C. | TCP broadcast |
| D. | TCP unicast |
| Answer» B. UDP unicast | |
| 491. |
The DHCP server can provide the _______ of the IP addresses. |
| A. | dynamic allocation |
| B. | automatic allocation |
| C. | static allocation |
| D. | all of the mentioned |
| Answer» E. | |
| 492. |
DHCP uses UDP port _________ for sending data to the server. |
| A. | 66 |
| B. | 67 |
| C. | 68 |
| D. | 69 |
| Answer» C. 68 | |
| 493. |
IP assigned for a client by DHCP server is |
| A. | for a limited period |
| B. | for unlimited period |
| C. | not time dependent |
| D. | none of the mentioned |
| Answer» B. for unlimited period | |
| 494. |
The DHCP server |
| A. | maintains a database of available IP addresses |
| B. | maintains the information about client configuration parameters |
| C. | grants a IP address when receives a request from a client |
| D. | all of the mentioned |
| Answer» E. | |
| 495. |
DHCP is used for |
| A. | IPv6 |
| B. | IPv4 |
| C. | Both IPv6 and IPv4 |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 496. |
DHCP (dynamic host configuration protocol) provides __________ to the client. |
| A. | IP address |
| B. | MAC address |
| C. | Url |
| D. | None of the mentioned |
| Answer» B. MAC address | |
| 497. |
Which one of the following authentication method is used by SSH? |
| A. | public-key |
| B. | host based |
| C. | password |
| D. | all of the mentioned |
| Answer» E. | |
| 498. |
SCP protocol is evolved from __________ over SSH. |
| A. | RCP protocol |
| B. | DHCP protocol |
| C. | MGCP protocol |
| D. | none of the mentioned |
| Answer» B. DHCP protocol | |
| 499. |
SSH-2 does not contain |
| A. | transport layer |
| B. | user authentication layer |
| C. | physical layer |
| D. | connection layer |
| Answer» D. connection layer | |
| 500. |
Which one of the following is a file transfer protocol using SSH? |
| A. | SCP |
| B. | SFTP |
| C. | Rsync |
| D. | All of the mentioned |
| Answer» E. | |