MCQOPTIONS
Saved Bookmarks
This section includes 728 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
| 401. |
IP Security operates in which layer of the OSI model? |
| A. | Network |
| B. | Transport |
| C. | Application |
| D. | Physical |
| Answer» B. Transport | |
| 402. |
IPsec defines two protocols: _______ and ________ |
| A. | AH; SSL |
| B. | PGP; ESP |
| C. | AH; ESP |
| D. | All of the mentioned |
| Answer» D. All of the mentioned | |
| 403. |
______ provides authentication at the IP level. |
| A. | AH |
| B. | ESP |
| C. | PGP |
| D. | SSL |
| Answer» B. ESP | |
| 404. |
Which two types of IPsec can be used to secure communications between two LANs? |
| A. | AH tunnel mode |
| B. | ESP tunnel mode |
| C. | Both AH tunnel mode and ESP tunnel mode |
| D. | ESP transport mode |
| Answer» D. ESP transport mode | |
| 405. |
Which two types of encryption protocols can be used to secure the authentication of computers using IPsec? |
| A. | Kerberos V5 |
| B. | SHA |
| C. | MD5 |
| D. | Both SHA and MD5 |
| Answer» E. | |
| 406. |
Which mode of IPsec should you use to assure security and confidentiality of data within the same LAN? |
| A. | AH transport mode |
| B. | ESP transport mode |
| C. | ESP tunnel mode |
| D. | AH tunnel mode |
| Answer» C. ESP tunnel mode | |
| 407. |
Correct expression for UDP user datagram length is |
| A. | UDP length = IP length – IP header’s length |
| B. | UDP length = UDP length – UDP header’s length |
| C. | UDP length = IP length + IP header’s length |
| D. | UDP length = UDP length + UDP header’s length |
| Answer» B. UDP length = UDP length – UDP header’s length | |
| 408. |
“Total length” field in UDP packet header is the length of |
| A. | Only UDP header |
| B. | Only data |
| C. | Only checksum |
| D. | UDP header plus data |
| Answer» E. | |
| 409. |
The port number is “ephemeral port number”, if the source host is …… |
| A. | NTP |
| B. | Echo |
| C. | Server |
| D. | Client |
| Answer» E. | |
| 410. |
what is the header size of UDP packet? |
| A. | 8 bytes |
| B. | 8 bits |
| C. | 16 bytes |
| D. | 124 bytes |
| Answer» B. 8 bits | |
| 411. |
Port number used by Network Time Protocol(NTP) with UDP is |
| A. | 161 |
| B. | 123 |
| C. | 162 |
| D. | 124 |
| Answer» C. 162 | |
| 412. |
The main advantage of UDP is |
| A. | More overload |
| B. | Reliable |
| C. | Less overload |
| D. | Fast |
| Answer» D. Fast | |
| 413. |
Beyond IP, TCP provides additional services such as |
| A. | Routing and switching |
| B. | Sending and receiving of packets |
| C. | Multiplexing and demultiplexing |
| D. | Demultiplexing and error checking |
| Answer» E. | |
| 414. |
Return value of the UDP port “Chargen” is |
| A. | String of characters |
| B. | String of integers |
| C. | Array of characters with integers |
| D. | Array of zero’s and one’s |
| Answer» B. String of integers | |
| 415. |
Which of the following is false with respect to UDP |
| A. | Connection-oriented |
| B. | Unreliable |
| C. | Transport layer protocol |
| D. | All of the mentioned |
| Answer» B. Unreliable | |
| 416. |
Size of source and destination port address of TCP header respectively are |
| A. | 16-bits and 32-bits |
| B. | 16-bits and 16-bits |
| C. | 32-bits and 16-bits |
| D. | 32-bits and 32-bits |
| Answer» C. 32-bits and 16-bits | |
| 417. |
SYNC flooding attack belongs to a type of security attack known as |
| A. | SYNC flooding attack |
| B. | Active attack |
| C. | Passive attack |
| D. | Denial-of-service attack |
| Answer» E. | |
| 418. |
The situation when a malicious attacker sends a large number of SYNC segments to a server, pretending that each of them is coming from a different client by faking the source IP address in the datagrams |
| A. | SYNC flooding attack |
| B. | Active attack |
| C. | Passive attack |
| D. | Denial-of-service attack |
| Answer» B. Active attack | |
| 419. |
In Three-Way Handshaking process, the situation where both the TCP’s issue an active open is |
| A. | Mutual open |
| B. | Mutual Close |
| C. | Simultaneous open |
| D. | Simultaneous close |
| Answer» D. Simultaneous close | |
| 420. |
The process of, A client that wishes to connect to an open server tells its TCP that it needs to be connected to that particular server is |
| A. | Active open |
| B. | Active close |
| C. | Passive close |
| D. | Passive open |
| Answer» B. Active close | |
| 421. |
The server program tells its TCP that it is ready to accept a connection. This process is called |
| A. | Active open |
| B. | Active close |
| C. | Passive close |
| D. | Passive open |
| Answer» E. | |
| 422. |
Connection establishment in TCP is done by which mechanism? |
| A. | Flow control |
| B. | Three-Way Handshaking |
| C. | Forwarding |
| D. | Synchronisation |
| Answer» C. Forwarding | |
| 423. |
Size of TCP segment header ranges between |
| A. | 16 and 32 bytes |
| B. | 16 and 32 bits |
| C. | 20 and 60 bytes |
| D. | 20 and 60 bits |
| Answer» D. 20 and 60 bits | |
| 424. |
The receiver of the data controls the amount of data that are to be sent by the sender is referred as |
| A. | Flow control |
| B. | Error control |
| C. | Congestion control |
| D. | Error detection |
| Answer» B. Error control | |
| 425. |
The value of acknowledgement field in a segment defines |
| A. | Number of previous bytes to receive |
| B. | Total number of bytes to receive |
| C. | Number of next bytes to receive |
| D. | Sequence of zero’s and one’s |
| Answer» D. Sequence of zero’s and one’s | |
| 426. |
Bytes of data being transferred in each connection are numbered by TCP. These numbers starts with a |
| A. | Random number |
| B. | Zero |
| C. | One |
| D. | Sequence of zero’s and one’s |
| Answer» E. | |
| 427. |
Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered 10001. What is the sequence number of the segment if all data is sent in only one segment. |
| A. | 10000 |
| B. | 10001 |
| C. | 12001 |
| D. | 11001 |
| Answer» C. 12001 | |
| 428. |
In segment header, sequence number and acknowledgement number field refers to |
| A. | Byte number |
| B. | Buffer number |
| C. | Segment number |
| D. | Acknowledgment |
| Answer» B. Buffer number | |
| 429. |
To achieve reliable transport in TCP, ___________ is used to check the safe and sound arrival of data. |
| A. | Packet |
| B. | Buffer |
| C. | Segment |
| D. | Acknowledgment |
| Answer» E. | |
| 430. |
Communication offered by TCP is |
| A. | Full-duplex |
| B. | Half-duplex |
| C. | Semi-duplex |
| D. | Byte by byte |
| Answer» B. Half-duplex | |
| 431. |
TCP groups a number of bytes together into a packet called |
| A. | Packet |
| B. | Buffer |
| C. | Segment |
| D. | Stack |
| Answer» D. Stack | |
| 432. |
TCP process may not write and read data at the same speed. So we need __________ for storage. |
| A. | Packets |
| B. | Buffers |
| C. | Segments |
| D. | Stacks |
| Answer» C. Segments | |
| 433. |
In TCP, sending and receiving data is done as |
| A. | Stream of bytes |
| B. | Sequence of characters |
| C. | Lines of data |
| D. | Packets |
| Answer» B. Sequence of characters | |
| 434. |
Which of the following is true with respect to TCP |
| A. | Connection-oriented |
| B. | Process-to-process |
| C. | Transport layer protocol |
| D. | All of the mentioned |
| Answer» E. | |
| 435. |
In telnet, the client echoes the character on the screen but does not send it until a whole line is completed in |
| A. | default mode |
| B. | character mode |
| C. | server mode |
| D. | none of the mentioned |
| Answer» B. character mode | |
| 436. |
In character mode operation of telnet implementation |
| A. | each character typed is sent by the client to the server |
| B. | each character typed is discarded by the server |
| C. | each character typed is aggregated into a word and then send to the server |
| D. | none of the mentioned |
| Answer» B. each character typed is discarded by the server | |
| 437. |
The decimal code of interpret as command (IAC) character is |
| A. | 252 |
| B. | 253 |
| C. | 254 |
| D. | 255 |
| Answer» E. | |
| 438. |
AbsoluteTelnet is a telnet client for |
| A. | windows |
| B. | linux |
| C. | mac |
| D. | none of the mentioned |
| Answer» B. linux | |
| 439. |
All telnet operations are sent as |
| A. | 4 bytes |
| B. | 8 bytes |
| C. | 16 bytes |
| D. | 32 bytes |
| Answer» C. 16 bytes | |
| 440. |
Telnet protocol is used to establish a connection to |
| A. | TCP port number 21 |
| B. | TCP port number 22 |
| C. | TCP port number 23 |
| D. | TCP port number 24 |
| Answer» D. TCP port number 24 | |
| 441. |
If we want that a character be interpreted by the client instead of server |
| A. | escape character has to be used |
| B. | control functions has to be disabled |
| C. | it is not possible |
| D. | none of the mentioned |
| Answer» B. control functions has to be disabled | |
| 442. |
Which operating mode of telnet is full duplex? |
| A. | default mode |
| B. | server mode |
| C. | line mode |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 443. |
Telnet is a |
| A. | Television on net |
| B. | Network of Telephones |
| C. | Remote Login |
| D. | Teleshopping site |
| Answer» D. Teleshopping site | |
| 444. |
_______ allows you to connect and login to a remote computer |
| A. | Telnet |
| B. | FTP |
| C. | HTTP |
| D. | None of the mentioned |
| Answer» B. FTP | |
| 445. |
In “character at a time” mode |
| A. | Character processing is done on the local system under the control of the remote system |
| B. | Most text typed is immediately sent to the remote host for processing |
| C. | All text is echoed locally, only completed lines are sent to the remote host |
| D. | None of the mentioned |
| Answer» C. All text is echoed locally, only completed lines are sent to the remote host | |
| 446. |
The protocol used by Telnet application is |
| A. | Telnet |
| B. | FTP |
| C. | HTTP |
| D. | None of the mentioned |
| Answer» B. FTP | |
| 447. |
Structure of Management Information (SMI), is guideline of |
| A. | HTTP |
| B. | SNMP |
| C. | URL |
| D. | MIB |
| Answer» C. URL | |
| 448. |
SNMP is a framework for managing devices in an internet using the |
| A. | TCP/IP protocol |
| B. | UDP |
| C. | SMTP |
| D. | None |
| Answer» B. UDP | |
| 449. |
Control of users’ access to network resources through charges are main responsibilities of |
| A. | Reactive Fault Management |
| B. | Reconfigured Fault Management |
| C. | Accounting Management |
| D. | Security Management |
| Answer» D. Security Management | |
| 450. |
BER stands for |
| A. | Basic Encoding Rules |
| B. | Basic Encoding Resolver |
| C. | Basic Encoding Rotator |
| D. | Basic Encoding Router |
| Answer» B. Basic Encoding Resolver | |