MCQOPTIONS
Saved Bookmarks
This section includes 728 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
What is the purpose of a shadow honeypot? |
| A. | To flag attacks against known vulnerabilities |
| B. | To help reduce false positives in a signature-based IDS |
| C. | To randomly check suspicious traffic identified by an anomaly detection system |
| D. | To enhance the accuracy of a traditional honeypot |
| Answer» D. To enhance the accuracy of a traditional honeypot | |
| 52. |
One of the most obvious places to put an IDS sensor is near the firewall. Where exactly in relation to the firewall is the most productive placement? |
| A. | Inside the firewall |
| B. | Outside the firewall |
| C. | Both inside and outside the firewall |
| D. | Neither inside the firewall nor outside the firewall. |
| Answer» B. Outside the firewall | |
| 53. |
A false positive can be defined as… |
| A. | An alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior |
| B. | An alert that indicates nefarious activity on a system that is not running on the network |
| C. | The lack of an alert for nefarious activity |
| D. | Both An alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior and An alert that indicates nefarious activity on a system that is not running on the network |
| Answer» E. | |
| 54. |
Which of the following is an advantage of anomaly detection? |
| A. | Rules are easy to define |
| B. | Custom protocols can be easily analyzed |
| C. | The engine can scale as the rule set grows |
| D. | Malicious activity that falls within normal usage patterns is detected |
| Answer» D. Malicious activity that falls within normal usage patterns is detected | |
| 55. |
The local operating system on the server machine passes the incoming packets to the |
| A. | server stub |
| B. | client stub |
| C. | client operating system |
| D. | none of the mentioned |
| Answer» B. client stub | |
| 56. |
RPC is a |
| A. | synchronous operation |
| B. | asynchronous operation |
| C. | time independent operation |
| D. | none of the mentioned |
| Answer» B. asynchronous operation | |
| 57. |
RPC is used to |
| A. | establish a server on remote machine that can respond to queries |
| B. | retrieve information by calling a query |
| C. | both establish a server on remote machine that can respond to queries and retrieve information by calling a query |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 58. |
An RPC application requires |
| A. | specific protocol for client server communication |
| B. | a client program |
| C. | a server program |
| D. | all of the mentioned |
| Answer» E. | |
| 59. |
A remote procedure is uniquely identified by |
| A. | program number |
| B. | version number |
| C. | procedure number |
| D. | all of the mentioned |
| Answer» E. | |
| 60. |
RPC works between two processes. These processes must be |
| A. | on the same computer |
| B. | on different computers connected with a network |
| C. | both on the same computer and on different computers connected with a network |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 61. |
RPC allows a computer program to cause a subroutine to execute in |
| A. | its own address space |
| B. | another address space |
| C. | both its own address space and another address space |
| D. | none of the mentioned |
| Answer» C. both its own address space and another address space | |
| 62. |
Remote procedure calls is |
| A. | inter-process communication |
| B. | a single process |
| C. | a single thread |
| D. | none of the mentioned |
| Answer» B. a single process | |
| 63. |
In RPC, while a server is processing the call, the client is blocked |
| A. | unless the client sends an asynchronous request to the server |
| B. | unless the call processing is complete |
| C. | for the complete duration of the connection |
| D. | none of the mentioned |
| Answer» B. unless the call processing is complete | |
| 64. |
An RPC (remote procedure call) is initiated by the |
| A. | server |
| B. | client |
| C. | both server and client |
| D. | none of the mentioned |
| Answer» C. both server and client | |
| 65. |
Which protocol defines a profile of RTP that provides cryptographic services for the transfer of payload data? |
| A. | SRTP |
| B. | RTCP |
| C. | RCP |
| D. | None of the mentioned |
| Answer» B. RTCP | |
| 66. |
An RTP header has a minimum size of |
| A. | 12 bytes |
| B. | 16 bytes |
| C. | 24 bytes |
| D. | 32 bytes |
| Answer» B. 16 bytes | |
| 67. |
Which one of the following multimedia formats can not be supported by RTP? |
| A. | MPEG-4 |
| B. | MJPEG |
| C. | MPEG |
| D. | None of the mentioned |
| Answer» E. | |
| 68. |
RTP can use |
| A. | unprevileleged UDP ports |
| B. | stream control transmission protocol |
| C. | datagram congestion control protocol |
| D. | all of the mentioned |
| Answer» E. | |
| 69. |
An RTP session is established for |
| A. | each media stream |
| B. | all media streams |
| C. | some predefined number of media streams |
| D. | none of the mentioned |
| Answer» B. all media streams | |
| 70. |
Which protocol provides the synchronization between media streams? |
| A. | RTP |
| B. | RTCP |
| C. | RPC |
| D. | None of the mentioned |
| Answer» C. RPC | |
| 71. |
RTP provides the facility of jitter ____________ |
| A. | media stream |
| B. | expansion |
| C. | both media stream and expansion |
| D. | none of the mentioned |
| Answer» B. expansion | |
| 72. |
RTP is used to |
| A. | carry the media stream |
| B. | monitor transmission statistics of streams |
| C. | monitor quality of service of streams |
| D. | none of the mentioned |
| Answer» B. monitor transmission statistics of streams | |
| 73. |
Real-time transport protocol (RTP) is mostly used in |
| A. | streaming media |
| B. | video teleconference |
| C. | television services |
| D. | all of the mentioned |
| Answer» E. | |
| 74. |
What is SDH? |
| A. | sdh is similar standard to SONET developed by ITU-T |
| B. | synchronous digital hierarchy |
| C. | both sdh is similar standard to SONET developed by ITU-T and synchronous digital hierarchy |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 75. |
A unidirectional path switching ring is a network with |
| A. | one ring |
| B. | two rings |
| C. | three rings |
| D. | four rings |
| Answer» C. three rings | |
| 76. |
Automatic protection switching in linear network is defined at the |
| A. | line layer |
| B. | section layer |
| C. | photonic layer |
| D. | path layer |
| Answer» B. section layer | |
| 77. |
A linear SONET network can be |
| A. | point-to-point |
| B. | multi-point |
| C. | both point-to-point and multi-point |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 78. |
Which one of the following is not true about SONET? |
| A. | frames of lower rate can be synchronously time-division multiplexed into a higher-rate frame |
| B. | multiplexing is synchronous TDM |
| C. | all clocks in the network are locked to a master clock |
| D. | none of the mentioned |
| Answer» E. | |
| 79. |
In SONET, each synchronous transfer signal STS-n is composed of |
| A. | 2000 frames |
| B. | 4000 frames |
| C. | 8000 frames |
| D. | 16000 frames |
| Answer» D. 16000 frames | |
| 80. |
4. The photonic layer of the SONET is similar to the __________ of OSI model. |
| A. | network layer |
| B. | data link layer |
| C. | physical layer |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 81. |
The path layer of SONET is responsible for the movement of a signal |
| A. | from its optical source to its optical destination |
| B. | across a physical line |
| C. | across a physical section |
| D. | none of the mentioned |
| Answer» C. across a physical section | |
| 82. |
In SONET, STS-1 level of electrical signalling has the data rate of |
| A. | 51.84 Mbps |
| B. | 155.52 Mbps |
| C. | 466.56 Mbps |
| D. | none of the mentioned |
| Answer» B. 155.52 Mbps | |
| 83. |
SONET stands for |
| A. | synchronous optical network |
| B. | synchronous operational network |
| C. | stream optical network |
| D. | shell operational network |
| Answer» B. synchronous operational network | |
| 84. |
Which one of the following frequency is not used in WiMAX for communication? |
| A. | 2.3 GHz |
| B. | 2.4 GHz |
| C. | 2.5 GHz |
| D. | 3.5 GHz |
| Answer» C. 2.5 GHz | |
| 85. |
WiMAX is mostly used for |
| A. | local area network |
| B. | metropolitan area network |
| C. | personal area network |
| D. | none of the mentioned |
| Answer» C. personal area network | |
| 86. |
Devices that provide the connectivity to a WiMAX network are known as |
| A. | subscriber stations |
| B. | base stations |
| C. | gateway |
| D. | none of the mentioned |
| Answer» B. base stations | |
| 87. |
For encryption, WiMAX supports |
| A. | advanced encryption standard |
| B. | triple data encryption standard |
| C. | both advanced encryption standard and triple data encryption standard |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 88. |
WiMAX MAC layer provides an interface between |
| A. | higher transport layers and physical layer |
| B. | application layer and network layer |
| C. | data link layer and network layer |
| D. | none of the mentioned |
| Answer» B. application layer and network layer | |
| 89. |
Which one of the following modulation scheme is supported by WiMAX? |
| A. | binary phase shift keying modulation |
| B. | quadrature phase shift keying modulation |
| C. | quadrature amplitude modulation |
| D. | all of the mentioned |
| Answer» E. | |
| 90. |
WiMAX uses the |
| A. | orthogonal frequency division multiplexing |
| B. | time division multiplexing |
| C. | space division multiplexing |
| D. | all of the mentioned |
| Answer» B. time division multiplexing | |
| 91. |
WiMAX provides |
| A. | simplex communication |
| B. | half duplex communication |
| C. | full duplex communication |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 92. |
WiMAX stands for |
| A. | wireless maximum communication |
| B. | worldwide interoperability for microwave access |
| C. | worldwide international standard for microwave access |
| D. | none of the mentioned |
| Answer» C. worldwide international standard for microwave access | |
| 93. |
A scatternet can have maximum |
| A. | 10 piconets |
| B. | 20 piconets |
| C. | 30 piconets |
| D. | 40 piconets |
| Answer» B. 20 piconets | |
| 94. |
The bluetooth supports |
| A. | point-to-point connections |
| B. | point-to-multipoint connection |
| C. | both point-to-point connections and point-to-multipoint connection |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 95. |
Bluetooth transceiver devices operate in ______ band. |
| A. | 2.4 GHz ISM |
| B. | 2.5 GHz ISM |
| C. | 2.6 GHz ISM |
| D. | 2.7 GHz ISM |
| Answer» B. 2.5 GHz ISM | |
| 96. |
In the piconet of bluetooth one master device |
| A. | can not be slave |
| B. | can be slave in another piconet |
| C. | can be slave in the same piconet |
| D. | none of the mentioned |
| Answer» C. can be slave in the same piconet | |
| 97. |
What is A2DP (advanced audio distribution profile)? |
| A. | a bluetooth profile for streaming audio |
| B. | a bluetooth profile for streaming video |
| C. | a bluetooth profile for security |
| D. | none of the mentioned |
| Answer» B. a bluetooth profile for streaming video | |
| 98. |
Unauthorised access of information from a wireless device through a bluetooth connection is called |
| A. | bluemaking |
| B. | bluesnarfing |
| C. | bluestring |
| D. | none of the mentioned |
| Answer» C. bluestring | |
| 99. |
Bluetooth uses |
| A. | frequency hoping spread spectrum |
| B. | orthogonal frequency division multiplexing |
| C. | time division multiplexing |
| D. | none of the mentioned |
| Answer» B. orthogonal frequency division multiplexing | |
| 100. |
Bluetooth is the wireless technology for |
| A. | local area network |
| B. | personal area network |
| C. | both local area network and personal area network |
| D. | none of the mentioned |
| Answer» C. both local area network and personal area network | |